Vulnerability from csaf_suse
Published
2022-06-14 18:32
Modified
2022-06-14 18:32
Summary
Security update for the Linux Kernel

Notes

Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 kernel was updated. The following security bugs were fixed: - CVE-2022-21127: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650) - CVE-2022-21123: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650) - CVE-2022-21125: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650) - CVE-2022-21180: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650) - CVE-2022-21166: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650) - CVE-2022-1972: Fixed a buffer overflow in nftable that could lead to privilege escalation. (bsc#1200019) - CVE-2022-1729: Fixed a sys_perf_event_open() race condition against self (bsc#1199507). - CVE-2022-1184: Fixed an use-after-free and memory errors in ext4 when mounting and operating on a corrupted image. (bsc#1198577) - CVE-2022-1652: Fixed a statically allocated error counter inside the floppy kernel module (bsc#1199063). - CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199505). - CVE-2021-33061: Fixed insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters that may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1196426). - CVE-2019-19377: Fixed an user-after-free that could be triggered when an attacker mounts a crafted btrfs filesystem image. (bnc#1158266) - CVE-2022-20008: Fixed bug that allows to read kernel heap memory due to uninitialized data in mmc_blk_read_single of block.c. (bnc#1199564) - CVE-2022-0168: Fixed a NULL pointer dereference in smb2_ioctl_query_info. (bsc#1197472) - CVE-2022-24448: Fixed an issue if an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612). The following non-security bugs were fixed: - ACPI: property: Release subnode properties with data nodes (git-fixes). - ALSA: ctxfi: Add SB046x PCI ID (git-fixes). - ALSA: fireworks: fix wrong return count shorter than expected by 4 bytes (git-fixes). - ALSA: hda - fix unused Realtek function when PM is not enabled (git-fixes). - ALSA: hda/realtek - Add new type for ALC245 (git-fixes). - ALSA: hda/realtek - Fix microphone noise on ASUS TUF B550M-PLUS (git-fixes). - ALSA: hda/realtek: Enable 4-speaker output for Dell XPS 15 9520 laptop (git-fixes). - ALSA: hda/realtek: Enable headset mic on Lenovo P360 (git-fixes). - ALSA: pcm: Check for null pointer of pointer substream before dereferencing it (git-fixes). - ALSA: usb-audio: Add missing ep_idx in fixed EP quirks (git-fixes). - ALSA: usb-audio: Clear MIDI port active flag after draining (git-fixes). - ALSA: usb-audio: Configure sync endpoints before data (git-fixes). - ALSA: usb-audio: Fix undefined behavior due to shift overflowing the constant (git-fixes). - ALSA: usb-audio: Restore Rane SL-1 quirk (git-fixes). - ALSA: wavefront: Proper check of get_user() error (git-fixes). - ARM: 9169/1: entry: fix Thumb2 bug in iWMMXt exception handling (git-fixes) - ARM: 9170/1: fix panic when kasan and kprobe are enabled (git-fixes) - ARM: 9187/1: JIVE: fix return value of __setup handler (git-fixes) - ARM: config: u8500: Re-enable AB8500 battery charging (git-fixes) - ARM: davinci: da850-evm: Avoid NULL pointer dereference (git-fixes) - ARM: dts: am3517-evm: Fix misc pinmuxing (git-fixes) - ARM: dts: armada-38x: Add generic compatible to UART nodes (git-fixes) - ARM: dts: at91: fix pinctrl phandles (git-fixes) - ARM: dts: at91: Map MCLK for wm8731 on at91sam9g20ek (git-fixes) - ARM: dts: at91: sama5d2: Fix PMERRLOC resource size (git-fixes) - ARM: dts: at91: sama5d4_xplained: fix pinctrl phandle name (git-fixes) - ARM: dts: bcm2835-rpi-b: Fix GPIO line names (git-fixes) - ARM: dts: bcm2835-rpi-zero-w: Fix GPIO line name for Wifi/BT (git-fixes) - ARM: dts: bcm2837-rpi-3-b-plus: Fix GPIO line name of power LED (git-fixes) - ARM: dts: bcm2837-rpi-cm3-io3: Fix GPIO line names for SMPS I2C (git-fixes) - ARM: dts: exynos: fix UART3 pins configuration in Exynos5250 (git-fixes) - ARM: dts: Fix OpenBMC flash layout label addresses (git-fixes) - ARM: dts: imx: Add missing LVDS decoder on M53Menlo (git-fixes) - ARM: dts: imx23-evk: Remove MX23_PAD_SSP1_DETECT from hog group (git-fixes) - ARM: dts: imx6qdl-apalis: Fix sgtl5000 detection issue (git-fixes) - ARM: dts: imx6qdl-udoo: Properly describe the SD card detect (git-fixes) - ARM: dts: imx6ull-colibri: fix vqmmc regulator (git-fixes) - ARM: dts: imx6ull-pinfunc: Fix CSI_DATA07__ESAI_TX0 pad name (git-fixes) - ARM: dts: logicpd-som-lv: Fix wrong pinmuxing on OMAP35 (git-fixes) - ARM: dts: meson: Fix the UART compatible strings (git-fixes) - ARM: dts: meson8: Fix the UART device-tree schema validation (git-fixes) - ARM: dts: meson8b: Fix the UART device-tree schema validation (git-fixes) - ARM: dts: qcom: ipq4019: fix sleep clock (git-fixes) - ARM: dts: qcom: msm8974: Drop flags for mdss irqs (git-fixes) - ARM: dts: suniv: F1C100: fix watchdog compatible (git-fixes) - ARM: ftrace: ensure that ADR takes the Thumb bit into account (git-fixes) - ARM: mediatek: select arch timer for mt7629 (git-fixes) - ARM: omap: remove debug-leds driver (git-fixes) - ARM: OMAP2+: Fix refcount leak in omap_gic_of_init (git-fixes) - ARM: socfpga: dts: fix qspi node compatible (git-fixes) - ARM: socfpga: fix missing RESET_CONTROLLER (git-fixes) - ARM: tegra: Move panels to AUX bus (git-fixes) - arm64: dts: broadcom: Fix sata nodename (git-fixes) - arm64: dts: ns2: Fix spi-cpol and spi-cpha property (git-fixes) - arm64: dts: rockchip: Fix SDIO regulator supply properties on (git-fixes) - arm64: paravirt: Use RCU read locks to guard stolen_time (git-fixes). - arm64: pgtable: make __pte_to_phys/__phys_to_pte_val inline functions (git-fixes) - arm64/mm: avoid fixmap race condition when create pud mapping (git-fixes) - ASoC: atmel-classd: Remove endianness flag on class d component (git-fixes). - ASoC: atmel-pdmic: Remove endianness flag on pdmic component (git-fixes). - ASoC: da7219: Fix change notifications for tone generator frequency (git-fixes). - ASoC: dmaengine: Restore NULL prepare_slave_config() callback (git-fixes). - ASoC: fsl_sai: Fix FSL_SAI_xDR/xFR definition (git-fixes). - ASoC: max98090: Generate notifications on changes for custom control (git-fixes). - ASoC: max98090: Move check for invalid values before casting in max98090_put_enab_tlv() (git-fixes). - ASoC: max98090: Reject invalid values in custom control put() (git-fixes). - ASoC: mediatek: Fix error handling in mt8173_max98090_dev_probe (git-fixes). - ASoC: mediatek: Fix missing of_node_put in mt2701_wm8960_machine_probe (git-fixes). - ASoC: meson: Fix event generation for G12A tohdmi mux (git-fixes). - ASoC: mxs-saif: Fix refcount leak in mxs_saif_probe (git-fixes). - ASoC: ops: Validate input values in snd_soc_put_volsw_range() (git-fixes). - ASoC: rk3328: fix disabling mclk on pclk probe failure (git-fixes). - ASoC: rt5514: Fix event generation for 'DSP Voice Wake Up' control (git-fixes). - ASoC: ti: j721e-evm: Fix refcount leak in j721e_soc_probe_* (git-fixes). - ASoC: wm2000: fix missing clk_disable_unprepare() on error in wm2000_anc_transition() (git-fixes). - ASoC: wm8958: Fix change notifications for DSP controls (git-fixes). - assoc_array: Fix BUG_ON during garbage collect (git-fixes). - ata: pata_hpt37x: fix PCI clock detection (git-fixes). - ata: pata_marvell: Check the 'bmdma_addr' beforing reading (git-fixes). - ath9k_htc: fix potential out of bounds access with invalid rxstatus->rs_keyix (git-fixes). - ath9k: fix ar9003_get_eepmisc (git-fixes). - backlight: qcom-wled: Respect enabled-strings in set_brightness (bsc#1152489) - batman-adv: Do not skb_split skbuffs with frag_list (git-fixes). - blk-cgroup: move blkcg_{get,set}_fc_appid out of line (bsc#1200045). - Bluetooth: call hci_le_conn_failed with hdev lock in hci_le_conn_failed (git-fixes). - Bluetooth: fix dangling sco_conn and use-after-free in sco_sock_timeout (git-fixes). - Bluetooth: Fix the creation of hdev->name (git-fixes). - Bluetooth: hci_qca: Use del_timer_sync() before freeing (git-fixes). - bnxt_en: Fix possible bnxt_open() failure caused by wrong RFS flag (jsc#SLE-8371 bsc#1153274). - bnxt_en: Fix unnecessary dropping of RX packets (jsc#SLE-15075). - brcmfmac: sdio: Fix undefined behavior due to shift overflowing the constant (git-fixes). - bus: sunxi-rsb: Fix the return value of sunxi_rsb_device_create() (git-fixes). - bus: ti-sysc: Fix warnings for unbind for serial (git-fixes). - can: grcan: grcan_close(): fix deadlock (git-fixes). - can: grcan: use ofdev->dev when allocating DMA memory (git-fixes). - carl9170: tx: fix an incorrect use of list iterator (git-fixes). - ceph: fix setting of xattrs on async created inodes (bsc#1200192). - cgroup/cpuset: Remove cpus_allowed/mems_allowed setup in cpuset_init_smp() (bsc#1199839). - clk: at91: generated: consider range when calculating best rate (git-fixes). - clk: bcm2835: fix bcm2835_clock_choose_div (git-fixes). - clk: imx8mp: fix usb_root_clk parent (git-fixes). - clk: renesas: r9a06g032: Fix the RTC hclock description (git-fixes). - clk: sunxi: sun9i-mmc: check return value after calling platform_get_resource() (git-fixes). - copy_process(): Move fd_install() out of sighand->siglock critical section (bsc#1199626). - crypto: caam - fix i.MX6SX entropy delay value (git-fixes). - crypto: ecrdsa - Fix incorrect use of vli_cmp (git-fixes). - crypto: stm32 - fix reference leak in stm32_crc_remove (git-fixes). - crypto: x86 - eliminate anonymous module_init & module_exit (git-fixes). - crypto: x86/chacha20 - Avoid spurious jumps to other functions (git-fixes). - dim: initialize all struct fields (git-fixes). - dmaengine: idxd: Fix the error handling path in idxd_cdev_register() (git-fixes). - dmaengine: stm32-mdma: remove GISR1 register (git-fixes). - docs: powerpc: Fix misspellings and grammar errors (bsc#1055117 ltc#159753). - docs: submitting-patches: Fix crossref to 'The canonical patch format' (git-fixes). - drbd: fix an invalid memory access caused by incorrect use of list iterator (git-fixes). - drbd: fix duplicate array initializer (git-fixes). - drbd: Fix five use after free bugs in get_initial_state (git-fixes). - drbd: remove assign_p_sizes_qlim (git-fixes). - drbd: use bdev based limit helpers in drbd_send_sizes (git-fixes). - drbd: use bdev_alignment_offset instead of queue_alignment_offset (git-fixes). - driver core: fix deadlock in __device_attach (git-fixes). - driver: base: fix UAF when driver_attach failed (git-fixes). - drivers: base: cacheinfo: Get rid of DEFINE_SMP_CALL_CACHE_FUNCTION() (git-fixes) - drivers/base/memory: fix an unlikely reference counting issue in __add_memory_block() (git-fixes). - drivers/base/node.c: fix compaction sysfs file leak (git-fixes). - drm: mali-dp: potential dereference of null pointer (git-fixes). - drm: msm: fix possible memory leak in mdp5_crtc_cursor_set() (git-fixes). - drm: sti: do not use kernel-doc markers (git-fixes). - drm/amd/display: Fix memory leak in dcn21_clock_source_create (bsc#1152472) - drm/amd/display/dc/gpio/gpio_service: Pass around correct dce_{version, environment} types (git-fixes). - drm/amdgpu: fix amdgpu_ras_block_late_init error handler (bsc#1152489) - drm/amdkfd: Fix GWS queue count (git-fixes). - drm/blend: fix typo in the comment (git-fixes). - drm/bridge: adv7511: clean up CEC adapter when probe fails (git-fixes). - drm/bridge: analogix_dp: Grab runtime PM reference for DP-AUX (git-fixes). - drm/bridge: Fix error handling in analogix_dp_probe (git-fixes). - drm/cma-helper: Set VM_DONTEXPAND for mmap (bsc#1152472) - drm/edid: fix invalid EDID extension block filtering (git-fixes). - drm/fb-helper: Mark screen buffers in system memory with (bsc#1152472) - drm/i915: Drop all references to DRM IRQ midlayer (bsc#1152489) - drm/i915: Fix CFI violation with show_dynamic_id() (git-fixes). - drm/i915: Fix SEL_FETCH_PLANE_*(PIPE_B+) register addresses (git-fixes). - drm/i915: Keep gem ctx->vm alive until the final put (bsc#1152489) - drm/i915: s/JSP2/ICP2/ PCH (bsc#1152489) - drm/komeda: Fix an undefined behavior bug in komeda_plane_add() (git-fixes). - drm/mediatek: Fix mtk_cec_mask() (git-fixes). - drm/msm: return an error pointer in msm_gem_prime_get_sg_table() (git-fixes). - drm/msm/a6xx: Fix refcount leak in a6xx_gpu_init (git-fixes). - drm/msm/disp/dpu1: set vbif hw config to NULL to avoid use after memory free during pm runtime resume (git-fixes). - drm/msm/dpu: adjust display_v_end for eDP and DP (git-fixes). - drm/msm/dsi: fix error checks and return values for DSI xmit functions (git-fixes). - drm/msm/hdmi: check return value after calling platform_get_resource_byname() (git-fixes). - drm/msm/hdmi: fix error check return value of irq_of_parse_and_map() (git-fixes). - drm/msm/mdp5: check the return of kzalloc() (git-fixes). - drm/msm/mdp5: Return error code in mdp5_mixer_release when deadlock is detected (git-fixes). - drm/msm/mdp5: Return error code in mdp5_pipe_release when deadlock is detected (git-fixes). - drm/nouveau: Fix a potential theorical leak in nouveau_get_backlight_name() (git-fixes). - drm/nouveau/clk: Fix an incorrect NULL check on list iterator (git-fixes). - drm/nouveau/kms/nv50-: atom: fix an incorrect NULL check on list iterator (git-fixes). - drm/nouveau/tegra: Stop using iommu_present() (git-fixes). - drm/panel: simple: Add missing bus flags for Innolux G070Y2-L01 (git-fixes). - drm/prime: Fix use after free in mmap with drm_gem_ttm_mmap (bsc#1152472) - drm/rockchip: vop: fix possible null-ptr-deref in vop_bind() (git-fixes). - drm/vc4: crtc: Lookup the encoder from the register at boot (bsc#1198534) - drm/vc4: hvs: Reset muxes at probe time (git-fixes). - drm/vc4: txp: Do not set TXP_VSTART_AT_EOF (git-fixes). - drm/vc4: txp: Force alpha to be 0xff if it's disabled (git-fixes). - drm/vmwgfx: Initialize drm_mode_fb_cmd2 (git-fixes). - drm/vmwgfx: Remove unused compile options (bsc#1152472) - EDAC/synopsys: Read the error count from the correct register (bsc#1178134). - firewire: core: extend card->lock in fw_core_handle_bus_reset (git-fixes). - firewire: fix potential uaf in outbound_phy_packet_callback() (git-fixes). - firewire: remove check of list iterator against head past the loop body (git-fixes). - firmware: arm_scmi: Fix list protocols enumeration in the base protocol (git-fixes). - firmware: arm_scmi: Validate BASE_DISCOVER_LIST_PROTOCOLS response (git-fixes). - firmware: dmi-sysfs: Fix memory leak in dmi_sysfs_register_handle (git-fixes). - firmware: stratix10-svc: fix a missing check on list iterator (git-fixes). - Fix double fget() in vhost_net_set_backend() (git-fixes). - genirq: Fix reference leaks on irq affinity notifiers (git-fixes) - genirq: Let GENERIC_IRQ_IPI select IRQ_DOMAIN_HIERARCHY (git-fixes) - genirq/affinity: Consider that CPUs on nodes can be (git-fixes) - genirq/affinity: Handle affinity setting on inactive (git-fixes) - genirq/msi: Ensure deactivation on teardown (git-fixes) - genirq/proc: Reject invalid affinity masks (again) (git-fixes) - genirq/timings: Fix error return code in (git-fixes) - genirq/timings: Prevent potential array overflow in (git-fixes) - gma500: fix an incorrect NULL check on list iterator (git-fixes). - gpio: adp5588: Remove support for platform setup and teardown callbacks (git-fixes). - gpio: gpio-vf610: do not touch other bits when set the target bit (git-fixes). - gpio: mvebu/pwm: Refuse requests with inverted polarity (git-fixes). - gpio: pca953x: fix irq_stat not updated when irq is disabled (irq_mask not set) (git-fixes). - gpio: pca953x: use the correct register address to do regcache sync (git-fixes). - gpiolib: of: fix bounds check for 'gpio-reserved-ranges' (git-fixes). - hex2bin: fix access beyond string end (git-fixes). - HID: elan: Fix potential double free in elan_input_configured (git-fixes). - HID: hid-led: fix maximum brightness for Dream Cheeky (git-fixes). - hinic: fix bug of wq out of bound access (bsc#1176447). - hwmon: (f71882fg) Fix negative temperature (git-fixes). - hwmon: (ltq-cputemp) restrict it to SOC_XWAY (git-fixes). - hwmon: (tmp401) Add OF device ID table (git-fixes). - i2c: at91: Initialize dma_buf in at91_twi_xfer() (git-fixes). - i2c: at91: use dma safe buffers (git-fixes). - i2c: mt7621: fix missing clk_disable_unprepare() on error in mtk_i2c_probe() (git-fixes). - i40e: stop disabling VFs due to PF error responses (git-fixes). - ice: arfs: fix use-after-free when freeing @rx_cpu_rmap (jsc#SLE-12878). - ice: Clear default forwarding VSI during VSI release (jsc#SLE-12878). - ice: Do not skip not enabled queues in ice_vc_dis_qs_msg (jsc#SLE-7926). - ice: Fix race conditions between virtchnl handling and VF ndo ops (git-fixes). - ice: synchronize_rcu() when terminating rings (jsc#SLE-7926). - iio: adc: ad7124: Remove shift from scan_type (git-fixes). - iio: adc: sc27xx: Fine tune the scale calibration values (git-fixes). - iio: adc: sc27xx: fix read big scale voltage not right (git-fixes). - iio: adc: stmpe-adc: Fix wait_for_completion_timeout return value check (git-fixes). - iio: dac: ad5446: Fix read_raw not returning set value (git-fixes). - iio: dac: ad5592r: Fix the missing return value (git-fixes). - iio: magnetometer: ak8975: Fix the error handling in ak8975_power_on() (git-fixes). - Input: add bounds checking to input_set_capability() (git-fixes). - Input: ili210x - fix reset timing (git-fixes). - Input: sparcspkr - fix refcount leak in bbc_beep_probe (git-fixes). - Input: stmfts - do not leave device disabled in stmfts_input_open (git-fixes). - Input: stmfts - fix reference leak in stmfts_input_open (git-fixes). - iommu/amd: Increase timeout waiting for GA log enablement (bsc#1199052). - ionic: avoid races in ionic_heartbeat_check (bsc#1167773). - ionic: Cleanups in the Tx hotpath code (bsc#1167773). - ionic: disable napi when ionic_lif_init() fails (bsc#1167773). - ionic: Do not send reset commands if FW isn't running (bsc#1167773). - ionic: fix missing pci_release_regions() on error in ionic_probe() (bsc#1167773). - ionic: fix type complaint in ionic_dev_cmd_clean() (jsc#SLE-16649). - ionic: monitor fw status generation (bsc#1167773). - ionic: remove the dbid_inuse bitmap (bsc#1167773). - ionic: start watchdog after all is setup (bsc#1167773). - ivtv: fix incorrect device_caps for ivtvfb (git-fixes). - iwlwifi: iwl-dbg: Use del_timer_sync() before freeing (git-fixes). - iwlwifi: mvm: fix the return type for DSM functions 1 and 2 (git-fixes). - jbd2: Fake symbols defined under CONFIG_JBD2_DEBUG (bsc#1198971). - kABI: ivtv: restore caps member (git-fixes). - Kconfig.debug: drop selecting non-existing HARDLOCKUP_DETECTOR_ARCH (git-fixes). - KVM: PPC: Fix TCE handling for VFIO (bsc#1061840 git-fixes). - KVM: VMX: Fix stale docs for kvm-intel.emulate_invalid_guest_state (git-fixes). - lan743x: fix rx_napi_poll/interrupt ping-pong (git-fixes). - lan743x: remove redundant assignment to variable rx_process_result (git-fixes). - lib/raid6/test: fix multiple definition linking error (git-fixes). - lpfc: Readd update to version 14.2.0.1 (bsc#1197675 bsc#1196478 bsc#1198989) The update was reverted due to some regression on older hardware. These have been fixed in the meantime, thus update the driver. - mac80211_hwsim: call ieee80211_tx_prepare_skb under RCU protection (git-fixes). - mac80211: fix rx reordering with non explicit / psmp ack policy (git-fixes). - mac80211: Reset MBSSID parameters upon connection (git-fixes). - media: davinci: Make use of the helper function devm_platform_ioremap_resource() (git-fixes). - media: davinci: vpif: fix unbalanced runtime PM enable (git-fixes). - media: davinci: vpif: fix use-after-free on driver unbind (git-fixes). - media: media-entity.h: Fix documentation for media_create_intf_link (git-fixes). - media: ov7670: remove ov7670_power_off from ov7670_remove (git-fixes). - media: platform: add missing put_device() call in mtk_jpeg_probe() and mtk_jpeg_remove() (git-fixes). - media: pvrusb2: fix array-index-out-of-bounds in pvr2_i2c_core_init (git-fixes). - media: saa7134: fix incorrect use to determine if list is empty (git-fixes). - media: uvcvideo: Fix missing check to determine if element is found in list (git-fixes). - media: videobuf2: Fix the size printk format (git-fixes). - media: vim2m: Register video device after setting up internals (git-fixes). - mfd: ipaq-micro: Fix error check return value of platform_get_irq() (git-fixes). - misc: ocxl: fix possible double free in ocxl_file_register_afu (git-fixes). - mm, page_alloc: fix build_zonerefs_node() (git-fixes). - mm/mmu_notifier.c: fix race in mmu_interval_notifier_remove() (jsc#SLE-15176, jsc#SLE-16387). - mmc: block: Use generic_cmd6_time when modifying INAND_CMD38_ARG_EXT_CSD (git-fixes). - mmc: core: Specify timeouts for BKOPS and CACHE_FLUSH for eMMC (git-fixes). - mt76: Fix undefined behavior due to shift overflowing the constant (git-fixes). - mt76: mt7663s: fix rx buffer refcounting (git-fixes). - mtd: rawnand: fix ecc parameters for mt7622 (git-fixes). - mtd: rawnand: Fix return value check of wait_for_completion_timeout (git-fixes). - mtd: spi-nor: core: Check written SR value in spi_nor_write_16bit_sr_and_check() (git-fixes). - net: bcmgenet: Fix a resource leak in an error handling path in the probe functin (git-fixes). - net: dsa: lantiq_gswip: Enable GSWIP_MII_CFG_EN also for internal PHYs (git-fixes). - net: dsa: lantiq_gswip: Fix GSWIP_MII_CFG(p) register access (git-fixes). - net: ethernet: Fix memleak in ethoc_probe (git-fixes). - net: ethernet: ti: cpts: fix ethtool output when no ptp_clock registered (git-fixes). - net: hdlc_ppp: Fix issues when mod_timer is called while timer is running (git-fixes). - net: hns3: add a check for index in hclge_get_rss_key() (git-fixes). - net: hns3: clear inited state and stop client after failed to register netdev (bsc#1154353). - net: hns3: fix bug when PF set the duplicate MAC address for VFs (jsc#SLE-14777). - net: hns3: fix kernel crash when unload VF while it is being reset (git-fixes). - net: korina: fix return value (git-fixes). - net: mana: Add counter for packet dropped by XDP (bsc#1195651). - net: mana: Add counter for XDP_TX (bsc#1195651). - net: mana: Add handling of CQE_RX_TRUNCATED (bsc#1195651). - net: mana: Remove unnecessary check of cqe_type in mana_process_rx_cqe() (bsc#1195651). - net: mana: Reuse XDP dropped page (bsc#1195651). - net: mana: Use struct_size() helper in mana_gd_create_dma_region() (bsc#1195651). - net: sched: fixed barrier to prevent skbuff sticking in qdisc backlog (bsc#1183405). - net: stmmac: dwmac-sun8i: Balance internal PHY power (git-fixes). - net: stmmac: dwmac-sun8i: Balance internal PHY resource references (git-fixes). - net: stmmac: dwmac-sun8i: Balance syscon (de)initialization (git-fixes). - net: stmmac: dwmac-sun8i: Fix probe error handling (git-fixes). - net/mlx5: Fix a race on command flush flow (jsc#SLE-15172). - net/mlx5e: Fix the calling of update_buffer_lossy() API (jsc#SLE-15172). - netdevice: demote the type of some dev_addr_set() helpers (bsc#1200216). - netfilter: conntrack: connection timeout after re-register (bsc#1199035). - netfilter: conntrack: move synack init code to helper (bsc#1199035). - netfilter: conntrack: re-init state for retransmitted syn-ack (bsc#1199035). - netfilter: nf_conntrack_tcp: preserve liberal flag in tcp options (bsc#1199035). - netfilter: nf_conntrack_tcp: re-init for syn packets only (bsc#1199035). - netfilter: nft_set_rbtree: overlap detection with element re-addition after deletion (bsc#1176447). - NFC: hci: fix sleep in atomic context bugs in nfc_hci_hcp_message_tx (git-fixes). - NFC: nci: fix sleep in atomic context bugs caused by nci_skb_alloc (git-fixes). - NFC: netlink: fix sleep in atomic bug when firmware download timeout (git-fixes). - NFC: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs (git-fixes). - NFC: NULL out the dev->rfkill to prevent UAF (git-fixes). - NFS: limit use of ACCESS cache for negative responses (bsc#1196570). - NFSv4: Do not invalidate inode attributes on delegation return (git-fixes). - nl80211: show SSID for P2P_GO interfaces (git-fixes). - nvdimm/region: always show the 'align' attribute (bsc#1199114). - nvme-tcp: allow selecting the network interface for connections (bsc#1199670). - nvme-tcp: use __dev_get_by_name instead dev_get_by_name for OPT_HOST_IFACE (bsc#1199670). - objtool: Fix type of reloc::addend (git-fixes). - PCI: aardvark: Clear all MSIs at setup (git-fixes). - PCI: cadence: Fix find_first_zero_bit() limit (git-fixes). - PCI: Do not enable AtomicOps on VFs (git-fixes). - PCI: dwc: Fix setting error return on MSI DMA mapping failure (git-fixes). - PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (bsc#1199314). - PCI: imx6: Fix PERST# start-up sequence (git-fixes). - PCI: iproc: Set affinity mask on MSI interrupts (git-fixes). - PCI: qcom: Fix runtime PM imbalance on probe errors (git-fixes). - PCI: qcom: Fix unbalanced PHY init on probe errors (git-fixes). - PCI: rockchip: Fix find_first_zero_bit() limit (git-fixes). - PCI/AER: Clear MULTI_ERR_COR/UNCOR_RCV bits (git-fixes). - PCI/PM: Power up all devices during runtime resume (git-fixes). - phy: mapphone-mdm6600: Fix PM error handling in phy_mdm6600_probe (git-fixes). - phy: qcom-qmp: fix pipe-clock imbalance on power-on failure (git-fixes). - phy: qcom-qmp: fix reset-controller leak on probe errors (git-fixes). - phy: qcom-qmp: fix struct clk leak on probe errors (git-fixes). - phy: samsung: exynos5250-sata: fix missing device put in probe error paths (git-fixes). - phy: samsung: Fix missing of_node_put() in exynos_sata_phy_probe (git-fixes). - phy: ti: Add missing pm_runtime_disable() in serdes_am654_probe (git-fixes). - phy: ti: omap-usb2: Fix error handling in omap_usb2_enable_clocks (git-fixes). - pinctrl: mvebu: Fix irq_of_parse_and_map() return value (git-fixes). - pinctrl: pistachio: fix use of irq_of_parse_and_map() (git-fixes). - pinctrl: rockchip: fix RK3308 pinmux bits (git-fixes). - pinctrl/rockchip: support deferring other gpio params (git-fixes). - ping: fix the sk_bound_dev_if match in ping_lookup (bsc#1195826). - ping: remove pr_err from ping_lookup (bsc#1195826). - platform/chrome: cros_ec_debugfs: detach log reader wq from devm (git-fixes). - platform/x86: samsung-laptop: Fix an unsigned comparison which can never be negative (git-fixes). - powerpc: Enable the DAWR on POWER9 DD2.3 and above (bsc#1055117 ltc#159753). - powerpc/64s: Add CPU_FTRS_POWER10 to ALWAYS mask (jsc#SLE-13521 git-fixes). - powerpc/64s: Add CPU_FTRS_POWER9_DD2_2 to CPU_FTRS_ALWAYS mask (bsc#1061840 git-fixes). - powerpc/64s/radix: Fix huge vmap false positive (bsc#1156395). - powerpc/fadump: fix PT_LOAD segment for boot memory area (bsc#1103269 ltc#169948 git-fixes). - powerpc/powernv: Add __init attribute to eligible functions (bsc#1188885 ltc#193722 git-fixes). - powerpc/powernv: Get L1D flush requirements from device-tree (bsc#1188885 ltc#193722 git-fixes). - powerpc/powernv: Get STF barrier requirements from device-tree (bsc#1188885 ltc#193722 git-fixes). - powerpc/powernv: Remove POWER9 PVR version check for entry and uaccess flushes (bsc#1188885 ltc#193722 git-fixes). - powerpc/xive: Add some error handling code to 'xive_spapr_init()' (git-fixes). - powerpc/xive: Fix refcount leak in xive_spapr_init (git-fixes). - pwm: lp3943: Fix duty calculation in case period was clamped (git-fixes). - pwm: raspberrypi-poe: Fix endianness in firmware struct (git-fixes). - qlcnic: Fix error code in probe (git-fixes). - regulator: core: Fix enable_count imbalance with EXCLUSIVE_GET (git-fixes). - regulator: pfuze100: Fix refcount leak in pfuze_parse_regulators_dt (git-fixes). - reset: tegra-bpmp: Restore Handle errors in BPMP response (git-fixes). - rtc: fix use-after-free on device removal (git-fixes). - rtc: mc146818-lib: Fix the AltCentury for AMD platforms (git-fixes). - rtc: mt6397: check return value after calling platform_get_resource() (git-fixes). - sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl (git-fixes). - sata_fsl: fix warning in remove_proc_entry when rmmod sata_fsl (git-fixes). - sched/pelt: Fix attach_entity_load_avg() corner case (git-fixes) - sched/topology: Skip updating masks for non-online nodes (bsc#1197446 ltc#183000). - scsi: dc395x: Fix a missing check on list iterator (git-fixes). - scsi: fnic: Fix a tracing statement (git-fixes). - scsi: fnic: Replace DMA mask of 64 bits with 47 bits (bsc#1199631). - scsi: hisi_sas: Change permission of parameter prot_mask (git-fixes). - scsi: lpfc: Alter FPIN stat accounting logic (bsc#1200045). - scsi: lpfc: Change FA-PWWN detection methodology (bsc#1200045). - scsi: lpfc: Change VMID registration to be based on fabric parameters (bsc#1200045). - scsi: lpfc: Clear fabric topology flag before initiating a new FLOGI (bsc#1200045). - scsi: lpfc: Copyright updates for 14.2.0.2 patches (bsc#1200045). - scsi: lpfc: Correct BDE DMA address assignment for GEN_REQ_WQE (bsc#1200045 bsc#1198989 bsc#1197675). - scsi: lpfc: Correct CRC32 calculation for congestion stats (bsc#1200045). - scsi: lpfc: Decrement outstanding gidft_inp counter if lpfc_err_lost_link() (bsc#1200045). - scsi: lpfc: Expand setting ELS_ID field in ELS_REQUEST64_WQE (bsc#1200045). - scsi: lpfc: Fill in missing ndlp kref puts in error paths (bsc#1200045). - scsi: lpfc: Fix additional reference counting in lpfc_bsg_rport_els() (bsc#1200045). - scsi: lpfc: Fix call trace observed during I/O with CMF enabled (bsc#1200045). - scsi: lpfc: Fix diagnostic fw logging after a function reset (bsc#1200045). - scsi: lpfc: Fix dmabuf ptr assignment in lpfc_ct_reject_event() (bsc#1200045). - scsi: lpfc: Fix element offset in __lpfc_sli_release_iocbq_s4() (bsc#1200045). - scsi: lpfc: Fix field overload in lpfc_iocbq data structure (bsc#1200045). - scsi: lpfc: Fix ndlp put following a LOGO completion (bsc#1200045). - scsi: lpfc: Fix null pointer dereference after failing to issue FLOGI and PLOGI (bsc#1200045). - scsi: lpfc: Fix resource leak in lpfc_sli4_send_seq_to_ulp() (bsc#1200045). - scsi: lpfc: Fix SCSI I/O completion and abort handler deadlock (bsc#1200045). - scsi: lpfc: Fix split code for FLOGI on FCoE (bsc#1200045 bsc#1198989 bsc#1197675). - scsi: lpfc: Inhibit aborts if external loopback plug is inserted (bsc#1200045). - scsi: lpfc: Introduce FC_RSCN_MEMENTO flag for tracking post RSCN completion (bsc#1200045). - scsi: lpfc: Move cfg_log_verbose check before calling lpfc_dmp_dbg() (bsc#1200045). - scsi: lpfc: Move MI module parameter check to handle dynamic disable (bsc#1200045). - scsi: lpfc: Protect memory leak for NPIV ports sending PLOGI_RJT (bsc#1200045). - scsi: lpfc: Refactor cleanup of mailbox commands (bsc#1200045). - scsi: lpfc: Register for Application Services FC-4 type in Fabric topology (bsc#1200045). - scsi: lpfc: Remove false FDMI NVMe FC-4 support for NPIV ports (bsc#1200045). - scsi: lpfc: Remove redundant lpfc_sli_prep_wqe() call (bsc#1200045). - scsi: lpfc: Remove unnecessary null ndlp check in lpfc_sli_prep_wqe() (bsc#1200045). - scsi: lpfc: Remove unnecessary NULL pointer assignment for ELS_RDF path (bsc#1200045). - scsi: lpfc: Remove unneeded variable (bsc#1200045). - scsi: lpfc: Requeue SCSI I/O to upper layer when fw reports link down (bsc#1200045). - scsi: lpfc: Revise FDMI reporting of supported port speed for trunk groups (bsc#1200045). - scsi: lpfc: Rework FDMI initialization after link up (bsc#1200045). - scsi: lpfc: Transition to NPR state upon LOGO cmpl if link down or aborted (bsc#1200045). - scsi: lpfc: Tweak message log categories for ELS/FDMI/NVMe rescan (bsc#1200045). - scsi: lpfc: Update fc_prli_sent outstanding only after guaranteed IOCB submit (bsc#1200045). - scsi: lpfc: Update lpfc version to 14.2.0.2 (bsc#1200045). - scsi: lpfc: Update lpfc version to 14.2.0.3 (bsc#1200045). - scsi: lpfc: Update stat accounting for READ_STATUS mbox command (bsc#1200045). - scsi: lpfc: Use list_for_each_entry_safe() in rscn_recovery_check() (bsc#1200045). - scsi: lpfc: Use sg_dma_address() and sg_dma_len() macros for NVMe I/O (bsc#1200045). - scsi: lpfc: Zero SLI4 fcp_cmnd buffer's fcpCntl0 field (bsc#1200045). - scsi: pm8001: Fix abort all task initialization (git-fixes). - scsi: pm8001: Fix command initialization in pm8001_chip_ssp_tm_req() (git-fixes). - scsi: pm8001: Fix command initialization in pm80XX_send_read_log() (git-fixes). - scsi: pm8001: Fix le32 values handling in pm80xx_chip_sata_req() (git-fixes). - scsi: pm8001: Fix le32 values handling in pm80xx_chip_ssp_io_req() (git-fixes). - scsi: pm8001: Fix le32 values handling in pm80xx_set_sas_protocol_timer_config() (git-fixes). - scsi: pm8001: Fix NCQ NON DATA command completion handling (git-fixes). - scsi: pm8001: Fix NCQ NON DATA command task initialization (git-fixes). - scsi: pm8001: Fix payload initialization in pm80xx_encrypt_update() (git-fixes). - scsi: pm8001: Fix payload initialization in pm80xx_set_thermal_config() (git-fixes). - scsi: pm80xx: Enable upper inbound, outbound queues (git-fixes). - scsi: pm80xx: Mask and unmask upper interrupt vectors 32-63 (git-fixes). - scsi: qla2xxx: edif: Remove unneeded variable (bsc#1200046). - scsi: qla2xxx: Fix missed DMA unmap for aborted commands (bsc#1200046). - scsi: qla2xxx: Remove free_sg command flag (bsc#1200046). - scsi: qla2xxx: Remove unneeded flush_workqueue() (bsc#1200046). - scsi: sr: Do not leak information in ioctl (git-fixes). - scsi: ufs: core: Exclude UECxx from SFR dump list (git-fixes). - scsi: ufs: qcom: Add a readl() to make sure ref_clk gets enabled (git-fixes). - scsi: ufs: qcom: Fix ufs_qcom_resume() (git-fixes). - scsi: virtio-scsi: Eliminate anonymous module_init & module_exit (git-fixes). - scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one() (git-fixes). - selftests: firmware: Use smaller dictionary for XZ compression (git-fixes). - serial: 8250_fintek: Check SER_RS485_RTS_* only with RS485 (git-fixes). - serial: 8250_mtk: Fix register address for XON/XOFF character (git-fixes). - serial: 8250_mtk: Fix UART_EFR register address (git-fixes). - serial: 8250: Also set sticky MCR bits in console restoration (git-fixes). - serial: 8250: core: Remove unneeded <linux/pm_runtime.h> (git-fixes). - serial: 8250: Correct the clock for EndRun PTP/1588 PCIe device (git-fixes). - serial: 8250: pxa: Remove unneeded <linux/pm_runtime.h> (git-fixes). - serial: digicolor-usart: Do not allow CS5-6 (git-fixes). - serial: imx: fix overrun interrupts in DMA mode (git-fixes). - serial: meson: acquire port->lock in startup() (git-fixes). - serial: pch: do not overwrite xmit->buf[0] by x_char (git-fixes). - serial: rda-uart: Do not allow CS5-6 (git-fixes). - serial: sh-sci: Do not allow CS5-6 (git-fixes). - serial: sifive: Sanitize CSIZE and c_iflag (git-fixes). - serial: st-asc: Sanitize CSIZE and correct PARENB for CS7 (git-fixes). - serial: stm32-usart: Correct CSIZE, bits, and parity (git-fixes). - serial: txx9: Do not allow CS5-6 (git-fixes). - slimbus: qcom: Fix IRQ check in qcom_slim_probe (git-fixes). - smp: Fix offline cpu check in flush_smp_call_function_queue() (git-fixes). - smsc911x: allow using IRQ0 (git-fixes). - soc: qcom: smp2p: Fix missing of_node_put() in smp2p_parse_ipc (git-fixes). - soc: qcom: smsm: Fix missing of_node_put() in smsm_parse_ipc (git-fixes). - soc: rockchip: Fix refcount leak in rockchip_grf_init (git-fixes). - spi: img-spfi: Fix pm_runtime_get_sync() error checking (git-fixes). - spi: spi-cadence: Fix kernel-doc format for resume/suspend (git-fixes). - spi: spi-fsl-qspi: check return value after calling platform_get_resource_byname() (git-fixes). - spi: spi-ti-qspi: Fix return value handling of wait_for_completion_timeout (git-fixes). - staging: fieldbus: Fix the error handling path in anybuss_host_common_probe() (git-fixes). - SUNRPC: Ensure gss-proxy connects on setup (git-fixes). - SUNRPC: Ensure that the gssproxy client can start in a connected state (git-fixes). - thermal: int340x: Fix attr.show callback prototype (git-fixes). - thermal/drivers/bcm2711: Do not clamp temperature at zero (git-fixes). - thermal/drivers/broadcom: Fix potential NULL dereference in sr_thermal_probe (git-fixes). - timekeeping: Really make sure wall_to_monotonic isn't (git-fixes) - timers: Fix warning condition in __run_timers() (git-fixes) - tpm: Fix buffer access in tpm2_get_tpm_pt() (git-fixes). - tpm: ibmvtpm: Correct the return value in tpm_ibmvtpm_probe() (bsc#1065729). - tracing: Fix potential double free in create_var_ref() (git-fixes). - tracing: Fix return value of trace_pid_write() (git-fixes). - tty: fix deadlock caused by calling printk() under tty_port->lock (git-fixes). - tty: goldfish: Use tty_port_destroy() to destroy port (git-fixes). - tty: serial: fsl_lpuart: fix potential bug when using both of_alias_get_id and ida_simple_get (git-fixes). - tty: serial: owl: Fix missing clk_disable_unprepare() in owl_uart_probe (git-fixes). - tty/serial: digicolor: fix possible null-ptr-deref in digicolor_uart_probe() (git-fixes). - usb: cdc-wdm: fix reading stuck on device close (git-fixes). - usb: dwc3: core: Fix tx/rx threshold settings (git-fixes). - usb: dwc3: core: Only handle soft-reset in DCTL (git-fixes). - usb: dwc3: gadget: Return proper request status (git-fixes). - usb: dwc3: pci: Fix pm_runtime_get_sync() error checking (git-fixes). - usb: ehci-omap: drop unused ehci_read() function (git-fixes). - usb: gadget: configfs: clear deactivation flag in configfs_composite_unbind() (git-fixes). - usb: hcd-pci: Use PCI_STD_NUM_BARS when checking standard BARs (bsc#1152489) - usb: misc: fix improper handling of refcount in uss720_probe() (git-fixes). - usb: mtu3: fix USB 3.0 dual-role-switch from device to host (git-fixes). - usb: musb: Fix missing of_node_put() in omap2430_probe (git-fixes). - usb: quirks: add a Realtek card reader (git-fixes). - usb: quirks: add STRING quirk for VCOM device (git-fixes). - usb: serial: cp210x: add PIDs for Kamstrup USB Meter Reader (git-fixes). - usb: serial: option: add Fibocom L610 modem (git-fixes). - usb: serial: option: add Fibocom MA510 modem (git-fixes). - usb: serial: option: add support for Cinterion MV32-WA/MV32-WB (git-fixes). - usb: serial: option: add Telit 0x1057, 0x1058, 0x1075 compositions (git-fixes). - usb: serial: pl2303: add device id for HP LM930 Display (git-fixes). - usb: serial: qcserial: add support for Sierra Wireless EM7590 (git-fixes). - usb: serial: whiteheat: fix heap overflow in WHITEHEAT_GET_DTR_RTS (git-fixes). - usb: storage: karma: fix rio_karma_init return (git-fixes). - usb: typec: mux: Check dev_set_name() return value (git-fixes). - usb: typec: tcpci: Do not skip cleanup in .remove() on error (git-fixes). - usb: typec: ucsi: Fix reuse of completion structure (git-fixes). - usb: typec: ucsi: Fix role swapping (git-fixes). - usb: usbip: add missing device lock on tweak configuration cmd (git-fixes). - usb: usbip: fix a refcount leak in stub_probe() (git-fixes). - video: fbdev: clcdfb: Fix refcount leak in clcdfb_of_vram_setup (git-fixes). - watchdog: ts4800_wdt: Fix refcount leak in ts4800_wdt_probe (git-fixes). - wifi: mac80211: fix use-after-free in chanctx code (git-fixes). - wireguard: device: check for metadata_dst with skb_valid_dst() (git-fixes). - xhci: increase usb U3 -> U0 link resume timeout from 100ms to 500ms (git-fixes). - xhci: stop polling roothubs after shutdown (git-fixes).
Patchnames
SUSE-2022-2079,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-2079,openSUSE-SLE-15.3-2022-2079
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
   document: {
      aggregate_severity: {
         namespace: "https://www.suse.com/support/security/rating/",
         text: "important",
      },
      category: "csaf_security_advisory",
      csaf_version: "2.0",
      distribution: {
         text: "Copyright 2024 SUSE LLC. All rights reserved.",
         tlp: {
            label: "WHITE",
            url: "https://www.first.org/tlp/",
         },
      },
      lang: "en",
      notes: [
         {
            category: "summary",
            text: "Security update for the Linux Kernel",
            title: "Title of the patch",
         },
         {
            category: "description",
            text: "\nThe SUSE Linux Enterprise 15 SP3 kernel was updated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-21127: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21123: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21125: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21180: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21166: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-1972: Fixed a buffer overflow in nftable that could lead to privilege escalation. (bsc#1200019)\n- CVE-2022-1729: Fixed a sys_perf_event_open() race condition against self (bsc#1199507).\n- CVE-2022-1184: Fixed an use-after-free and memory errors in ext4 when mounting and operating on a corrupted image. (bsc#1198577)\n- CVE-2022-1652: Fixed a statically allocated error counter inside the floppy kernel module (bsc#1199063).\n- CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199505).\n- CVE-2021-33061: Fixed insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters that may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1196426).\n- CVE-2019-19377: Fixed an user-after-free that could be triggered when an attacker mounts a crafted btrfs filesystem image. (bnc#1158266)\n- CVE-2022-20008: Fixed bug that allows to read kernel heap memory due to uninitialized data in mmc_blk_read_single of block.c. (bnc#1199564)\n- CVE-2022-0168: Fixed a NULL pointer dereference in smb2_ioctl_query_info. (bsc#1197472)\n- CVE-2022-24448: Fixed an issue if an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).\n\nThe following non-security bugs were fixed:\n\n- ACPI: property: Release subnode properties with data nodes (git-fixes).\n- ALSA: ctxfi: Add SB046x PCI ID (git-fixes).\n- ALSA: fireworks: fix wrong return count shorter than expected by 4 bytes (git-fixes).\n- ALSA: hda - fix unused Realtek function when PM is not enabled (git-fixes).\n- ALSA: hda/realtek - Add new type for ALC245 (git-fixes).\n- ALSA: hda/realtek - Fix microphone noise on ASUS TUF B550M-PLUS (git-fixes).\n- ALSA: hda/realtek: Enable 4-speaker output for Dell XPS 15 9520 laptop (git-fixes).\n- ALSA: hda/realtek: Enable headset mic on Lenovo P360 (git-fixes).\n- ALSA: pcm: Check for null pointer of pointer substream before dereferencing it (git-fixes).\n- ALSA: usb-audio: Add missing ep_idx in fixed EP quirks (git-fixes).\n- ALSA: usb-audio: Clear MIDI port active flag after draining (git-fixes).\n- ALSA: usb-audio: Configure sync endpoints before data (git-fixes).\n- ALSA: usb-audio: Fix undefined behavior due to shift overflowing the constant (git-fixes).\n- ALSA: usb-audio: Restore Rane SL-1 quirk (git-fixes).\n- ALSA: wavefront: Proper check of get_user() error (git-fixes).\n- ARM: 9169/1: entry: fix Thumb2 bug in iWMMXt exception handling (git-fixes)\n- ARM: 9170/1: fix panic when kasan and kprobe are enabled (git-fixes)\n- ARM: 9187/1: JIVE: fix return value of __setup handler (git-fixes)\n- ARM: config: u8500: Re-enable AB8500 battery charging (git-fixes)\n- ARM: davinci: da850-evm: Avoid NULL pointer dereference (git-fixes)\n- ARM: dts: am3517-evm: Fix misc pinmuxing (git-fixes)\n- ARM: dts: armada-38x: Add generic compatible to UART nodes (git-fixes)\n- ARM: dts: at91: fix pinctrl phandles (git-fixes)\n- ARM: dts: at91: Map MCLK for wm8731 on at91sam9g20ek (git-fixes)\n- ARM: dts: at91: sama5d2: Fix PMERRLOC resource size (git-fixes)\n- ARM: dts: at91: sama5d4_xplained: fix pinctrl phandle name (git-fixes)\n- ARM: dts: bcm2835-rpi-b: Fix GPIO line names (git-fixes)\n- ARM: dts: bcm2835-rpi-zero-w: Fix GPIO line name for Wifi/BT (git-fixes)\n- ARM: dts: bcm2837-rpi-3-b-plus: Fix GPIO line name of power LED (git-fixes)\n- ARM: dts: bcm2837-rpi-cm3-io3: Fix GPIO line names for SMPS I2C (git-fixes)\n- ARM: dts: exynos: fix UART3 pins configuration in Exynos5250 (git-fixes)\n- ARM: dts: Fix OpenBMC flash layout label addresses (git-fixes)\n- ARM: dts: imx: Add missing LVDS decoder on M53Menlo (git-fixes)\n- ARM: dts: imx23-evk: Remove MX23_PAD_SSP1_DETECT from hog group (git-fixes)\n- ARM: dts: imx6qdl-apalis: Fix sgtl5000 detection issue (git-fixes)\n- ARM: dts: imx6qdl-udoo: Properly describe the SD card detect (git-fixes)\n- ARM: dts: imx6ull-colibri: fix vqmmc regulator (git-fixes)\n- ARM: dts: imx6ull-pinfunc: Fix CSI_DATA07__ESAI_TX0 pad name (git-fixes)\n- ARM: dts: logicpd-som-lv: Fix wrong pinmuxing on OMAP35 (git-fixes)\n- ARM: dts: meson: Fix the UART compatible strings (git-fixes)\n- ARM: dts: meson8: Fix the UART device-tree schema validation (git-fixes)\n- ARM: dts: meson8b: Fix the UART device-tree schema validation (git-fixes)\n- ARM: dts: qcom: ipq4019: fix sleep clock (git-fixes)\n- ARM: dts: qcom: msm8974: Drop flags for mdss irqs (git-fixes)\n- ARM: dts: suniv: F1C100: fix watchdog compatible (git-fixes)\n- ARM: ftrace: ensure that ADR takes the Thumb bit into account (git-fixes)\n- ARM: mediatek: select arch timer for mt7629 (git-fixes)\n- ARM: omap: remove debug-leds driver (git-fixes)\n- ARM: OMAP2+: Fix refcount leak in omap_gic_of_init (git-fixes)\n- ARM: socfpga: dts: fix qspi node compatible (git-fixes)\n- ARM: socfpga: fix missing RESET_CONTROLLER (git-fixes)\n- ARM: tegra: Move panels to AUX bus (git-fixes)\n- arm64: dts: broadcom: Fix sata nodename (git-fixes)\n- arm64: dts: ns2: Fix spi-cpol and spi-cpha property (git-fixes)\n- arm64: dts: rockchip: Fix SDIO regulator supply properties on (git-fixes)\n- arm64: paravirt: Use RCU read locks to guard stolen_time (git-fixes).\n- arm64: pgtable: make __pte_to_phys/__phys_to_pte_val inline functions (git-fixes)\n- arm64/mm: avoid fixmap race condition when create pud mapping (git-fixes)\n- ASoC: atmel-classd: Remove endianness flag on class d component (git-fixes).\n- ASoC: atmel-pdmic: Remove endianness flag on pdmic component (git-fixes).\n- ASoC: da7219: Fix change notifications for tone generator frequency (git-fixes).\n- ASoC: dmaengine: Restore NULL prepare_slave_config() callback (git-fixes).\n- ASoC: fsl_sai: Fix FSL_SAI_xDR/xFR definition (git-fixes).\n- ASoC: max98090: Generate notifications on changes for custom control (git-fixes).\n- ASoC: max98090: Move check for invalid values before casting in max98090_put_enab_tlv() (git-fixes).\n- ASoC: max98090: Reject invalid values in custom control put() (git-fixes).\n- ASoC: mediatek: Fix error handling in mt8173_max98090_dev_probe (git-fixes).\n- ASoC: mediatek: Fix missing of_node_put in mt2701_wm8960_machine_probe (git-fixes).\n- ASoC: meson: Fix event generation for G12A tohdmi mux (git-fixes).\n- ASoC: mxs-saif: Fix refcount leak in mxs_saif_probe (git-fixes).\n- ASoC: ops: Validate input values in snd_soc_put_volsw_range() (git-fixes).\n- ASoC: rk3328: fix disabling mclk on pclk probe failure (git-fixes).\n- ASoC: rt5514: Fix event generation for 'DSP Voice Wake Up' control (git-fixes).\n- ASoC: ti: j721e-evm: Fix refcount leak in j721e_soc_probe_* (git-fixes).\n- ASoC: wm2000: fix missing clk_disable_unprepare() on error in wm2000_anc_transition() (git-fixes).\n- ASoC: wm8958: Fix change notifications for DSP controls (git-fixes).\n- assoc_array: Fix BUG_ON during garbage collect (git-fixes).\n- ata: pata_hpt37x: fix PCI clock detection (git-fixes).\n- ata: pata_marvell: Check the 'bmdma_addr' beforing reading (git-fixes).\n- ath9k_htc: fix potential out of bounds access with invalid rxstatus->rs_keyix (git-fixes).\n- ath9k: fix ar9003_get_eepmisc (git-fixes).\n- backlight: qcom-wled: Respect enabled-strings in set_brightness (bsc#1152489)\n- batman-adv: Do not skb_split skbuffs with frag_list (git-fixes).\n- blk-cgroup: move blkcg_{get,set}_fc_appid out of line (bsc#1200045).\n- Bluetooth: call hci_le_conn_failed with hdev lock in hci_le_conn_failed (git-fixes).\n- Bluetooth: fix dangling sco_conn and use-after-free in sco_sock_timeout (git-fixes).\n- Bluetooth: Fix the creation of hdev->name (git-fixes).\n- Bluetooth: hci_qca: Use del_timer_sync() before freeing (git-fixes).\n- bnxt_en: Fix possible bnxt_open() failure caused by wrong RFS flag (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: Fix unnecessary dropping of RX packets (jsc#SLE-15075).\n- brcmfmac: sdio: Fix undefined behavior due to shift overflowing the constant (git-fixes).\n- bus: sunxi-rsb: Fix the return value of sunxi_rsb_device_create() (git-fixes).\n- bus: ti-sysc: Fix warnings for unbind for serial (git-fixes).\n- can: grcan: grcan_close(): fix deadlock (git-fixes).\n- can: grcan: use ofdev->dev when allocating DMA memory (git-fixes).\n- carl9170: tx: fix an incorrect use of list iterator (git-fixes).\n- ceph: fix setting of xattrs on async created inodes (bsc#1200192).\n- cgroup/cpuset: Remove cpus_allowed/mems_allowed setup in cpuset_init_smp() (bsc#1199839).\n- clk: at91: generated: consider range when calculating best rate (git-fixes).\n- clk: bcm2835: fix bcm2835_clock_choose_div (git-fixes).\n- clk: imx8mp: fix usb_root_clk parent (git-fixes).\n- clk: renesas: r9a06g032: Fix the RTC hclock description (git-fixes).\n- clk: sunxi: sun9i-mmc: check return value after calling platform_get_resource() (git-fixes).\n- copy_process(): Move fd_install() out of sighand->siglock critical section (bsc#1199626).\n- crypto: caam - fix i.MX6SX entropy delay value (git-fixes).\n- crypto: ecrdsa - Fix incorrect use of vli_cmp (git-fixes).\n- crypto: stm32 - fix reference leak in stm32_crc_remove (git-fixes).\n- crypto: x86 - eliminate anonymous module_init & module_exit (git-fixes).\n- crypto: x86/chacha20 - Avoid spurious jumps to other functions (git-fixes).\n- dim: initialize all struct fields (git-fixes).\n- dmaengine: idxd: Fix the error handling path in idxd_cdev_register() (git-fixes).\n- dmaengine: stm32-mdma: remove GISR1 register (git-fixes).\n- docs: powerpc: Fix misspellings and grammar errors (bsc#1055117 ltc#159753).\n- docs: submitting-patches: Fix crossref to 'The canonical patch format' (git-fixes).\n- drbd: fix an invalid memory access caused by incorrect use of list iterator (git-fixes).\n- drbd: fix duplicate array initializer (git-fixes).\n- drbd: Fix five use after free bugs in get_initial_state (git-fixes).\n- drbd: remove assign_p_sizes_qlim (git-fixes).\n- drbd: use bdev based limit helpers in drbd_send_sizes (git-fixes).\n- drbd: use bdev_alignment_offset instead of queue_alignment_offset (git-fixes).\n- driver core: fix deadlock in __device_attach (git-fixes).\n- driver: base: fix UAF when driver_attach failed (git-fixes).\n- drivers: base: cacheinfo: Get rid of DEFINE_SMP_CALL_CACHE_FUNCTION() (git-fixes)\n- drivers/base/memory: fix an unlikely reference counting issue in __add_memory_block() (git-fixes).\n- drivers/base/node.c: fix compaction sysfs file leak (git-fixes).\n- drm: mali-dp: potential dereference of null pointer (git-fixes).\n- drm: msm: fix possible memory leak in mdp5_crtc_cursor_set() (git-fixes).\n- drm: sti: do not use kernel-doc markers (git-fixes).\n- drm/amd/display: Fix memory leak in dcn21_clock_source_create (bsc#1152472)\n- drm/amd/display/dc/gpio/gpio_service: Pass around correct dce_{version, environment} types (git-fixes).\n- drm/amdgpu: fix amdgpu_ras_block_late_init error handler (bsc#1152489)\n- drm/amdkfd: Fix GWS queue count (git-fixes).\n- drm/blend: fix typo in the comment (git-fixes).\n- drm/bridge: adv7511: clean up CEC adapter when probe fails (git-fixes).\n- drm/bridge: analogix_dp: Grab runtime PM reference for DP-AUX (git-fixes).\n- drm/bridge: Fix error handling in analogix_dp_probe (git-fixes).\n- drm/cma-helper: Set VM_DONTEXPAND for mmap (bsc#1152472)\n- drm/edid: fix invalid EDID extension block filtering (git-fixes).\n- drm/fb-helper: Mark screen buffers in system memory with (bsc#1152472)\n- drm/i915: Drop all references to DRM IRQ midlayer (bsc#1152489)\n- drm/i915: Fix CFI violation with show_dynamic_id() (git-fixes).\n- drm/i915: Fix SEL_FETCH_PLANE_*(PIPE_B+) register addresses (git-fixes).\n- drm/i915: Keep gem ctx->vm alive until the final put (bsc#1152489)\n- drm/i915: s/JSP2/ICP2/ PCH (bsc#1152489)\n- drm/komeda: Fix an undefined behavior bug in komeda_plane_add() (git-fixes).\n- drm/mediatek: Fix mtk_cec_mask() (git-fixes).\n- drm/msm: return an error pointer in msm_gem_prime_get_sg_table() (git-fixes).\n- drm/msm/a6xx: Fix refcount leak in a6xx_gpu_init (git-fixes).\n- drm/msm/disp/dpu1: set vbif hw config to NULL to avoid use after memory free during pm runtime resume (git-fixes).\n- drm/msm/dpu: adjust display_v_end for eDP and DP (git-fixes).\n- drm/msm/dsi: fix error checks and return values for DSI xmit functions (git-fixes).\n- drm/msm/hdmi: check return value after calling platform_get_resource_byname() (git-fixes).\n- drm/msm/hdmi: fix error check return value of irq_of_parse_and_map() (git-fixes).\n- drm/msm/mdp5: check the return of kzalloc() (git-fixes).\n- drm/msm/mdp5: Return error code in mdp5_mixer_release when deadlock is detected (git-fixes).\n- drm/msm/mdp5: Return error code in mdp5_pipe_release when deadlock is detected (git-fixes).\n- drm/nouveau: Fix a potential theorical leak in nouveau_get_backlight_name() (git-fixes).\n- drm/nouveau/clk: Fix an incorrect NULL check on list iterator (git-fixes).\n- drm/nouveau/kms/nv50-: atom: fix an incorrect NULL check on list iterator (git-fixes).\n- drm/nouveau/tegra: Stop using iommu_present() (git-fixes).\n- drm/panel: simple: Add missing bus flags for Innolux G070Y2-L01 (git-fixes).\n- drm/prime: Fix use after free in mmap with drm_gem_ttm_mmap (bsc#1152472)\n- drm/rockchip: vop: fix possible null-ptr-deref in vop_bind() (git-fixes).\n- drm/vc4: crtc: Lookup the encoder from the register at boot (bsc#1198534)\n- drm/vc4: hvs: Reset muxes at probe time (git-fixes).\n- drm/vc4: txp: Do not set TXP_VSTART_AT_EOF (git-fixes).\n- drm/vc4: txp: Force alpha to be 0xff if it's disabled (git-fixes).\n- drm/vmwgfx: Initialize drm_mode_fb_cmd2 (git-fixes).\n- drm/vmwgfx: Remove unused compile options (bsc#1152472)\n- EDAC/synopsys: Read the error count from the correct register (bsc#1178134).\n- firewire: core: extend card->lock in fw_core_handle_bus_reset (git-fixes).\n- firewire: fix potential uaf in outbound_phy_packet_callback() (git-fixes).\n- firewire: remove check of list iterator against head past the loop body (git-fixes).\n- firmware: arm_scmi: Fix list protocols enumeration in the base protocol (git-fixes).\n- firmware: arm_scmi: Validate BASE_DISCOVER_LIST_PROTOCOLS response (git-fixes).\n- firmware: dmi-sysfs: Fix memory leak in dmi_sysfs_register_handle (git-fixes).\n- firmware: stratix10-svc: fix a missing check on list iterator (git-fixes).\n- Fix double fget() in vhost_net_set_backend() (git-fixes).\n- genirq: Fix reference leaks on irq affinity notifiers (git-fixes)\n- genirq: Let GENERIC_IRQ_IPI select IRQ_DOMAIN_HIERARCHY (git-fixes)\n- genirq/affinity: Consider that CPUs on nodes can be (git-fixes)\n- genirq/affinity: Handle affinity setting on inactive (git-fixes)\n- genirq/msi: Ensure deactivation on teardown (git-fixes)\n- genirq/proc: Reject invalid affinity masks (again) (git-fixes)\n- genirq/timings: Fix error return code in (git-fixes)\n- genirq/timings: Prevent potential array overflow in (git-fixes)\n- gma500: fix an incorrect NULL check on list iterator (git-fixes).\n- gpio: adp5588: Remove support for platform setup and teardown callbacks (git-fixes).\n- gpio: gpio-vf610: do not touch other bits when set the target bit (git-fixes).\n- gpio: mvebu/pwm: Refuse requests with inverted polarity (git-fixes).\n- gpio: pca953x: fix irq_stat not updated when irq is disabled (irq_mask not set) (git-fixes).\n- gpio: pca953x: use the correct register address to do regcache sync (git-fixes).\n- gpiolib: of: fix bounds check for 'gpio-reserved-ranges' (git-fixes).\n- hex2bin: fix access beyond string end (git-fixes).\n- HID: elan: Fix potential double free in elan_input_configured (git-fixes).\n- HID: hid-led: fix maximum brightness for Dream Cheeky (git-fixes).\n- hinic: fix bug of wq out of bound access (bsc#1176447).\n- hwmon: (f71882fg) Fix negative temperature (git-fixes).\n- hwmon: (ltq-cputemp) restrict it to SOC_XWAY (git-fixes).\n- hwmon: (tmp401) Add OF device ID table (git-fixes).\n- i2c: at91: Initialize dma_buf in at91_twi_xfer() (git-fixes).\n- i2c: at91: use dma safe buffers (git-fixes).\n- i2c: mt7621: fix missing clk_disable_unprepare() on error in mtk_i2c_probe() (git-fixes).\n- i40e: stop disabling VFs due to PF error responses (git-fixes).\n- ice: arfs: fix use-after-free when freeing @rx_cpu_rmap (jsc#SLE-12878).\n- ice: Clear default forwarding VSI during VSI release (jsc#SLE-12878).\n- ice: Do not skip not enabled queues in ice_vc_dis_qs_msg (jsc#SLE-7926).\n- ice: Fix race conditions between virtchnl handling and VF ndo ops (git-fixes).\n- ice: synchronize_rcu() when terminating rings (jsc#SLE-7926).\n- iio: adc: ad7124: Remove shift from scan_type (git-fixes).\n- iio: adc: sc27xx: Fine tune the scale calibration values (git-fixes).\n- iio: adc: sc27xx: fix read big scale voltage not right (git-fixes).\n- iio: adc: stmpe-adc: Fix wait_for_completion_timeout return value check (git-fixes).\n- iio: dac: ad5446: Fix read_raw not returning set value (git-fixes).\n- iio: dac: ad5592r: Fix the missing return value (git-fixes).\n- iio: magnetometer: ak8975: Fix the error handling in ak8975_power_on() (git-fixes).\n- Input: add bounds checking to input_set_capability() (git-fixes).\n- Input: ili210x - fix reset timing (git-fixes).\n- Input: sparcspkr - fix refcount leak in bbc_beep_probe (git-fixes).\n- Input: stmfts - do not leave device disabled in stmfts_input_open (git-fixes).\n- Input: stmfts - fix reference leak in stmfts_input_open (git-fixes).\n- iommu/amd: Increase timeout waiting for GA log enablement (bsc#1199052).\n- ionic: avoid races in ionic_heartbeat_check (bsc#1167773).\n- ionic: Cleanups in the Tx hotpath code (bsc#1167773).\n- ionic: disable napi when ionic_lif_init() fails (bsc#1167773).\n- ionic: Do not send reset commands if FW isn't running (bsc#1167773).\n- ionic: fix missing pci_release_regions() on error in ionic_probe() (bsc#1167773).\n- ionic: fix type complaint in ionic_dev_cmd_clean() (jsc#SLE-16649).\n- ionic: monitor fw status generation (bsc#1167773).\n- ionic: remove the dbid_inuse bitmap (bsc#1167773).\n- ionic: start watchdog after all is setup (bsc#1167773).\n- ivtv: fix incorrect device_caps for ivtvfb (git-fixes).\n- iwlwifi: iwl-dbg: Use del_timer_sync() before freeing (git-fixes).\n- iwlwifi: mvm: fix the return type for DSM functions 1 and 2 (git-fixes).\n- jbd2: Fake symbols defined under CONFIG_JBD2_DEBUG (bsc#1198971).\n- kABI: ivtv: restore caps member (git-fixes).\n- Kconfig.debug: drop selecting non-existing HARDLOCKUP_DETECTOR_ARCH (git-fixes).\n- KVM: PPC: Fix TCE handling for VFIO (bsc#1061840 git-fixes).\n- KVM: VMX: Fix stale docs for kvm-intel.emulate_invalid_guest_state (git-fixes).\n- lan743x: fix rx_napi_poll/interrupt ping-pong (git-fixes).\n- lan743x: remove redundant assignment to variable rx_process_result (git-fixes).\n- lib/raid6/test: fix multiple definition linking error (git-fixes).\n- lpfc: Readd update to version 14.2.0.1 (bsc#1197675 bsc#1196478 bsc#1198989) The update was reverted due to some regression on older hardware. These have been fixed in the meantime, thus update the driver.\n- mac80211_hwsim: call ieee80211_tx_prepare_skb under RCU protection (git-fixes).\n- mac80211: fix rx reordering with non explicit / psmp ack policy (git-fixes).\n- mac80211: Reset MBSSID parameters upon connection (git-fixes).\n- media: davinci: Make use of the helper function devm_platform_ioremap_resource() (git-fixes).\n- media: davinci: vpif: fix unbalanced runtime PM enable (git-fixes).\n- media: davinci: vpif: fix use-after-free on driver unbind (git-fixes).\n- media: media-entity.h: Fix documentation for media_create_intf_link (git-fixes).\n- media: ov7670: remove ov7670_power_off from ov7670_remove (git-fixes).\n- media: platform: add missing put_device() call in mtk_jpeg_probe() and mtk_jpeg_remove() (git-fixes).\n- media: pvrusb2: fix array-index-out-of-bounds in pvr2_i2c_core_init (git-fixes).\n- media: saa7134: fix incorrect use to determine if list is empty (git-fixes).\n- media: uvcvideo: Fix missing check to determine if element is found in list (git-fixes).\n- media: videobuf2: Fix the size printk format (git-fixes).\n- media: vim2m: Register video device after setting up internals (git-fixes).\n- mfd: ipaq-micro: Fix error check return value of platform_get_irq() (git-fixes).\n- misc: ocxl: fix possible double free in ocxl_file_register_afu (git-fixes).\n- mm, page_alloc: fix build_zonerefs_node() (git-fixes).\n- mm/mmu_notifier.c: fix race in mmu_interval_notifier_remove() (jsc#SLE-15176, jsc#SLE-16387).\n- mmc: block: Use generic_cmd6_time when modifying INAND_CMD38_ARG_EXT_CSD (git-fixes).\n- mmc: core: Specify timeouts for BKOPS and CACHE_FLUSH for eMMC (git-fixes).\n- mt76: Fix undefined behavior due to shift overflowing the constant (git-fixes).\n- mt76: mt7663s: fix rx buffer refcounting (git-fixes).\n- mtd: rawnand: fix ecc parameters for mt7622 (git-fixes).\n- mtd: rawnand: Fix return value check of wait_for_completion_timeout (git-fixes).\n- mtd: spi-nor: core: Check written SR value in spi_nor_write_16bit_sr_and_check() (git-fixes).\n- net: bcmgenet: Fix a resource leak in an error handling path in the probe functin (git-fixes).\n- net: dsa: lantiq_gswip: Enable GSWIP_MII_CFG_EN also for internal PHYs (git-fixes).\n- net: dsa: lantiq_gswip: Fix GSWIP_MII_CFG(p) register access (git-fixes).\n- net: ethernet: Fix memleak in ethoc_probe (git-fixes).\n- net: ethernet: ti: cpts: fix ethtool output when no ptp_clock registered (git-fixes).\n- net: hdlc_ppp: Fix issues when mod_timer is called while timer is running (git-fixes).\n- net: hns3: add a check for index in hclge_get_rss_key() (git-fixes).\n- net: hns3: clear inited state and stop client after failed to register netdev (bsc#1154353).\n- net: hns3: fix bug when PF set the duplicate MAC address for VFs (jsc#SLE-14777).\n- net: hns3: fix kernel crash when unload VF while it is being reset (git-fixes).\n- net: korina: fix return value (git-fixes).\n- net: mana: Add counter for packet dropped by XDP (bsc#1195651).\n- net: mana: Add counter for XDP_TX (bsc#1195651).\n- net: mana: Add handling of CQE_RX_TRUNCATED (bsc#1195651).\n- net: mana: Remove unnecessary check of cqe_type in mana_process_rx_cqe() (bsc#1195651).\n- net: mana: Reuse XDP dropped page (bsc#1195651).\n- net: mana: Use struct_size() helper in mana_gd_create_dma_region() (bsc#1195651).\n- net: sched: fixed barrier to prevent skbuff sticking in qdisc backlog (bsc#1183405).\n- net: stmmac: dwmac-sun8i: Balance internal PHY power (git-fixes).\n- net: stmmac: dwmac-sun8i: Balance internal PHY resource references (git-fixes).\n- net: stmmac: dwmac-sun8i: Balance syscon (de)initialization (git-fixes).\n- net: stmmac: dwmac-sun8i: Fix probe error handling (git-fixes).\n- net/mlx5: Fix a race on command flush flow (jsc#SLE-15172).\n- net/mlx5e: Fix the calling of update_buffer_lossy() API (jsc#SLE-15172).\n- netdevice: demote the type of some dev_addr_set() helpers (bsc#1200216).\n- netfilter: conntrack: connection timeout after re-register (bsc#1199035).\n- netfilter: conntrack: move synack init code to helper (bsc#1199035).\n- netfilter: conntrack: re-init state for retransmitted syn-ack (bsc#1199035).\n- netfilter: nf_conntrack_tcp: preserve liberal flag in tcp options (bsc#1199035).\n- netfilter: nf_conntrack_tcp: re-init for syn packets only (bsc#1199035).\n- netfilter: nft_set_rbtree: overlap detection with element re-addition after deletion (bsc#1176447).\n- NFC: hci: fix sleep in atomic context bugs in nfc_hci_hcp_message_tx (git-fixes).\n- NFC: nci: fix sleep in atomic context bugs caused by nci_skb_alloc (git-fixes).\n- NFC: netlink: fix sleep in atomic bug when firmware download timeout (git-fixes).\n- NFC: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs (git-fixes).\n- NFC: NULL out the dev->rfkill to prevent UAF (git-fixes).\n- NFS: limit use of ACCESS cache for negative responses (bsc#1196570).\n- NFSv4: Do not invalidate inode attributes on delegation return (git-fixes).\n- nl80211: show SSID for P2P_GO interfaces (git-fixes).\n- nvdimm/region: always show the 'align' attribute (bsc#1199114).\n- nvme-tcp: allow selecting the network interface for connections (bsc#1199670).\n- nvme-tcp: use __dev_get_by_name instead dev_get_by_name for OPT_HOST_IFACE (bsc#1199670).\n- objtool: Fix type of reloc::addend (git-fixes).\n- PCI: aardvark: Clear all MSIs at setup (git-fixes).\n- PCI: cadence: Fix find_first_zero_bit() limit (git-fixes).\n- PCI: Do not enable AtomicOps on VFs (git-fixes).\n- PCI: dwc: Fix setting error return on MSI DMA mapping failure (git-fixes).\n- PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (bsc#1199314).\n- PCI: imx6: Fix PERST# start-up sequence (git-fixes).\n- PCI: iproc: Set affinity mask on MSI interrupts (git-fixes).\n- PCI: qcom: Fix runtime PM imbalance on probe errors (git-fixes).\n- PCI: qcom: Fix unbalanced PHY init on probe errors (git-fixes).\n- PCI: rockchip: Fix find_first_zero_bit() limit (git-fixes).\n- PCI/AER: Clear MULTI_ERR_COR/UNCOR_RCV bits (git-fixes).\n- PCI/PM: Power up all devices during runtime resume (git-fixes).\n- phy: mapphone-mdm6600: Fix PM error handling in phy_mdm6600_probe (git-fixes).\n- phy: qcom-qmp: fix pipe-clock imbalance on power-on failure (git-fixes).\n- phy: qcom-qmp: fix reset-controller leak on probe errors (git-fixes).\n- phy: qcom-qmp: fix struct clk leak on probe errors (git-fixes).\n- phy: samsung: exynos5250-sata: fix missing device put in probe error paths (git-fixes).\n- phy: samsung: Fix missing of_node_put() in exynos_sata_phy_probe (git-fixes).\n- phy: ti: Add missing pm_runtime_disable() in serdes_am654_probe (git-fixes).\n- phy: ti: omap-usb2: Fix error handling in omap_usb2_enable_clocks (git-fixes).\n- pinctrl: mvebu: Fix irq_of_parse_and_map() return value (git-fixes).\n- pinctrl: pistachio: fix use of irq_of_parse_and_map() (git-fixes).\n- pinctrl: rockchip: fix RK3308 pinmux bits (git-fixes).\n- pinctrl/rockchip: support deferring other gpio params (git-fixes).\n- ping: fix the sk_bound_dev_if match in ping_lookup (bsc#1195826).\n- ping: remove pr_err from ping_lookup (bsc#1195826).\n- platform/chrome: cros_ec_debugfs: detach log reader wq from devm (git-fixes).\n- platform/x86: samsung-laptop: Fix an unsigned comparison which can never be negative (git-fixes).\n- powerpc: Enable the DAWR on POWER9 DD2.3 and above (bsc#1055117 ltc#159753).\n- powerpc/64s: Add CPU_FTRS_POWER10 to ALWAYS mask (jsc#SLE-13521 git-fixes).\n- powerpc/64s: Add CPU_FTRS_POWER9_DD2_2 to CPU_FTRS_ALWAYS mask (bsc#1061840 git-fixes).\n- powerpc/64s/radix: Fix huge vmap false positive (bsc#1156395).\n- powerpc/fadump: fix PT_LOAD segment for boot memory area (bsc#1103269 ltc#169948 git-fixes).\n- powerpc/powernv: Add __init attribute to eligible functions (bsc#1188885 ltc#193722 git-fixes).\n- powerpc/powernv: Get L1D flush requirements from device-tree (bsc#1188885 ltc#193722 git-fixes).\n- powerpc/powernv: Get STF barrier requirements from device-tree (bsc#1188885 ltc#193722 git-fixes).\n- powerpc/powernv: Remove POWER9 PVR version check for entry and uaccess flushes (bsc#1188885 ltc#193722 git-fixes).\n- powerpc/xive: Add some error handling code to 'xive_spapr_init()' (git-fixes).\n- powerpc/xive: Fix refcount leak in xive_spapr_init (git-fixes).\n- pwm: lp3943: Fix duty calculation in case period was clamped (git-fixes).\n- pwm: raspberrypi-poe: Fix endianness in firmware struct (git-fixes).\n- qlcnic: Fix error code in probe (git-fixes).\n- regulator: core: Fix enable_count imbalance with EXCLUSIVE_GET (git-fixes).\n- regulator: pfuze100: Fix refcount leak in pfuze_parse_regulators_dt (git-fixes).\n- reset: tegra-bpmp: Restore Handle errors in BPMP response (git-fixes).\n- rtc: fix use-after-free on device removal (git-fixes).\n- rtc: mc146818-lib: Fix the AltCentury for AMD platforms (git-fixes).\n- rtc: mt6397: check return value after calling platform_get_resource() (git-fixes).\n- sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl (git-fixes).\n- sata_fsl: fix warning in remove_proc_entry when rmmod sata_fsl (git-fixes).\n- sched/pelt: Fix attach_entity_load_avg() corner case (git-fixes)\n- sched/topology: Skip updating masks for non-online nodes (bsc#1197446 ltc#183000).\n- scsi: dc395x: Fix a missing check on list iterator (git-fixes).\n- scsi: fnic: Fix a tracing statement (git-fixes).\n- scsi: fnic: Replace DMA mask of 64 bits with 47 bits (bsc#1199631).\n- scsi: hisi_sas: Change permission of parameter prot_mask (git-fixes).\n- scsi: lpfc: Alter FPIN stat accounting logic (bsc#1200045).\n- scsi: lpfc: Change FA-PWWN detection methodology (bsc#1200045).\n- scsi: lpfc: Change VMID registration to be based on fabric parameters (bsc#1200045).\n- scsi: lpfc: Clear fabric topology flag before initiating a new FLOGI (bsc#1200045).\n- scsi: lpfc: Copyright updates for 14.2.0.2 patches (bsc#1200045).\n- scsi: lpfc: Correct BDE DMA address assignment for GEN_REQ_WQE (bsc#1200045 bsc#1198989 bsc#1197675).\n- scsi: lpfc: Correct CRC32 calculation for congestion stats (bsc#1200045).\n- scsi: lpfc: Decrement outstanding gidft_inp counter if lpfc_err_lost_link() (bsc#1200045).\n- scsi: lpfc: Expand setting ELS_ID field in ELS_REQUEST64_WQE (bsc#1200045).\n- scsi: lpfc: Fill in missing ndlp kref puts in error paths (bsc#1200045).\n- scsi: lpfc: Fix additional reference counting in lpfc_bsg_rport_els() (bsc#1200045).\n- scsi: lpfc: Fix call trace observed during I/O with CMF enabled (bsc#1200045).\n- scsi: lpfc: Fix diagnostic fw logging after a function reset (bsc#1200045).\n- scsi: lpfc: Fix dmabuf ptr assignment in lpfc_ct_reject_event() (bsc#1200045).\n- scsi: lpfc: Fix element offset in __lpfc_sli_release_iocbq_s4() (bsc#1200045).\n- scsi: lpfc: Fix field overload in lpfc_iocbq data structure (bsc#1200045).\n- scsi: lpfc: Fix ndlp put following a LOGO completion (bsc#1200045).\n- scsi: lpfc: Fix null pointer dereference after failing to issue FLOGI and PLOGI (bsc#1200045).\n- scsi: lpfc: Fix resource leak in lpfc_sli4_send_seq_to_ulp() (bsc#1200045).\n- scsi: lpfc: Fix SCSI I/O completion and abort handler deadlock (bsc#1200045).\n- scsi: lpfc: Fix split code for FLOGI on FCoE (bsc#1200045 bsc#1198989 bsc#1197675).\n- scsi: lpfc: Inhibit aborts if external loopback plug is inserted (bsc#1200045).\n- scsi: lpfc: Introduce FC_RSCN_MEMENTO flag for tracking post RSCN completion (bsc#1200045).\n- scsi: lpfc: Move cfg_log_verbose check before calling lpfc_dmp_dbg() (bsc#1200045).\n- scsi: lpfc: Move MI module parameter check to handle dynamic disable (bsc#1200045).\n- scsi: lpfc: Protect memory leak for NPIV ports sending PLOGI_RJT (bsc#1200045).\n- scsi: lpfc: Refactor cleanup of mailbox commands (bsc#1200045).\n- scsi: lpfc: Register for Application Services FC-4 type in Fabric topology (bsc#1200045).\n- scsi: lpfc: Remove false FDMI NVMe FC-4 support for NPIV ports (bsc#1200045).\n- scsi: lpfc: Remove redundant lpfc_sli_prep_wqe() call (bsc#1200045).\n- scsi: lpfc: Remove unnecessary null ndlp check in lpfc_sli_prep_wqe() (bsc#1200045).\n- scsi: lpfc: Remove unnecessary NULL pointer assignment for ELS_RDF path (bsc#1200045).\n- scsi: lpfc: Remove unneeded variable (bsc#1200045).\n- scsi: lpfc: Requeue SCSI I/O to upper layer when fw reports link down (bsc#1200045).\n- scsi: lpfc: Revise FDMI reporting of supported port speed for trunk groups (bsc#1200045).\n- scsi: lpfc: Rework FDMI initialization after link up (bsc#1200045).\n- scsi: lpfc: Transition to NPR state upon LOGO cmpl if link down or aborted (bsc#1200045).\n- scsi: lpfc: Tweak message log categories for ELS/FDMI/NVMe rescan (bsc#1200045).\n- scsi: lpfc: Update fc_prli_sent outstanding only after guaranteed IOCB submit (bsc#1200045).\n- scsi: lpfc: Update lpfc version to 14.2.0.2 (bsc#1200045).\n- scsi: lpfc: Update lpfc version to 14.2.0.3 (bsc#1200045).\n- scsi: lpfc: Update stat accounting for READ_STATUS mbox command (bsc#1200045).\n- scsi: lpfc: Use list_for_each_entry_safe() in rscn_recovery_check() (bsc#1200045).\n- scsi: lpfc: Use sg_dma_address() and sg_dma_len() macros for NVMe I/O (bsc#1200045).\n- scsi: lpfc: Zero SLI4 fcp_cmnd buffer's fcpCntl0 field (bsc#1200045).\n- scsi: pm8001: Fix abort all task initialization (git-fixes).\n- scsi: pm8001: Fix command initialization in pm8001_chip_ssp_tm_req() (git-fixes).\n- scsi: pm8001: Fix command initialization in pm80XX_send_read_log() (git-fixes).\n- scsi: pm8001: Fix le32 values handling in pm80xx_chip_sata_req() (git-fixes).\n- scsi: pm8001: Fix le32 values handling in pm80xx_chip_ssp_io_req() (git-fixes).\n- scsi: pm8001: Fix le32 values handling in pm80xx_set_sas_protocol_timer_config() (git-fixes).\n- scsi: pm8001: Fix NCQ NON DATA command completion handling (git-fixes).\n- scsi: pm8001: Fix NCQ NON DATA command task initialization (git-fixes).\n- scsi: pm8001: Fix payload initialization in pm80xx_encrypt_update() (git-fixes).\n- scsi: pm8001: Fix payload initialization in pm80xx_set_thermal_config() (git-fixes).\n- scsi: pm80xx: Enable upper inbound, outbound queues (git-fixes).\n- scsi: pm80xx: Mask and unmask upper interrupt vectors 32-63 (git-fixes).\n- scsi: qla2xxx: edif: Remove unneeded variable (bsc#1200046).\n- scsi: qla2xxx: Fix missed DMA unmap for aborted commands (bsc#1200046).\n- scsi: qla2xxx: Remove free_sg command flag (bsc#1200046).\n- scsi: qla2xxx: Remove unneeded flush_workqueue() (bsc#1200046).\n- scsi: sr: Do not leak information in ioctl (git-fixes).\n- scsi: ufs: core: Exclude UECxx from SFR dump list (git-fixes).\n- scsi: ufs: qcom: Add a readl() to make sure ref_clk gets enabled (git-fixes).\n- scsi: ufs: qcom: Fix ufs_qcom_resume() (git-fixes).\n- scsi: virtio-scsi: Eliminate anonymous module_init & module_exit (git-fixes).\n- scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one() (git-fixes).\n- selftests: firmware: Use smaller dictionary for XZ compression (git-fixes).\n- serial: 8250_fintek: Check SER_RS485_RTS_* only with RS485 (git-fixes).\n- serial: 8250_mtk: Fix register address for XON/XOFF character (git-fixes).\n- serial: 8250_mtk: Fix UART_EFR register address (git-fixes).\n- serial: 8250: Also set sticky MCR bits in console restoration (git-fixes).\n- serial: 8250: core: Remove unneeded <linux/pm_runtime.h> (git-fixes).\n- serial: 8250: Correct the clock for EndRun PTP/1588 PCIe device (git-fixes).\n- serial: 8250: pxa: Remove unneeded <linux/pm_runtime.h> (git-fixes).\n- serial: digicolor-usart: Do not allow CS5-6 (git-fixes).\n- serial: imx: fix overrun interrupts in DMA mode (git-fixes).\n- serial: meson: acquire port->lock in startup() (git-fixes).\n- serial: pch: do not overwrite xmit->buf[0] by x_char (git-fixes).\n- serial: rda-uart: Do not allow CS5-6 (git-fixes).\n- serial: sh-sci: Do not allow CS5-6 (git-fixes).\n- serial: sifive: Sanitize CSIZE and c_iflag (git-fixes).\n- serial: st-asc: Sanitize CSIZE and correct PARENB for CS7 (git-fixes).\n- serial: stm32-usart: Correct CSIZE, bits, and parity (git-fixes).\n- serial: txx9: Do not allow CS5-6 (git-fixes).\n- slimbus: qcom: Fix IRQ check in qcom_slim_probe (git-fixes).\n- smp: Fix offline cpu check in flush_smp_call_function_queue() (git-fixes).\n- smsc911x: allow using IRQ0 (git-fixes).\n- soc: qcom: smp2p: Fix missing of_node_put() in smp2p_parse_ipc (git-fixes).\n- soc: qcom: smsm: Fix missing of_node_put() in smsm_parse_ipc (git-fixes).\n- soc: rockchip: Fix refcount leak in rockchip_grf_init (git-fixes).\n- spi: img-spfi: Fix pm_runtime_get_sync() error checking (git-fixes).\n- spi: spi-cadence: Fix kernel-doc format for resume/suspend (git-fixes).\n- spi: spi-fsl-qspi: check return value after calling platform_get_resource_byname() (git-fixes).\n- spi: spi-ti-qspi: Fix return value handling of wait_for_completion_timeout (git-fixes).\n- staging: fieldbus: Fix the error handling path in anybuss_host_common_probe() (git-fixes).\n- SUNRPC: Ensure gss-proxy connects on setup (git-fixes).\n- SUNRPC: Ensure that the gssproxy client can start in a connected state (git-fixes).\n- thermal: int340x: Fix attr.show callback prototype (git-fixes).\n- thermal/drivers/bcm2711: Do not clamp temperature at zero (git-fixes).\n- thermal/drivers/broadcom: Fix potential NULL dereference in sr_thermal_probe (git-fixes).\n- timekeeping: Really make sure wall_to_monotonic isn't (git-fixes)\n- timers: Fix warning condition in __run_timers() (git-fixes)\n- tpm: Fix buffer access in tpm2_get_tpm_pt() (git-fixes).\n- tpm: ibmvtpm: Correct the return value in tpm_ibmvtpm_probe() (bsc#1065729).\n- tracing: Fix potential double free in create_var_ref() (git-fixes).\n- tracing: Fix return value of trace_pid_write() (git-fixes).\n- tty: fix deadlock caused by calling printk() under tty_port->lock (git-fixes).\n- tty: goldfish: Use tty_port_destroy() to destroy port (git-fixes).\n- tty: serial: fsl_lpuart: fix potential bug when using both of_alias_get_id and ida_simple_get (git-fixes).\n- tty: serial: owl: Fix missing clk_disable_unprepare() in owl_uart_probe (git-fixes).\n- tty/serial: digicolor: fix possible null-ptr-deref in digicolor_uart_probe() (git-fixes).\n- usb: cdc-wdm: fix reading stuck on device close (git-fixes).\n- usb: dwc3: core: Fix tx/rx threshold settings (git-fixes).\n- usb: dwc3: core: Only handle soft-reset in DCTL (git-fixes).\n- usb: dwc3: gadget: Return proper request status (git-fixes).\n- usb: dwc3: pci: Fix pm_runtime_get_sync() error checking (git-fixes).\n- usb: ehci-omap: drop unused ehci_read() function (git-fixes).\n- usb: gadget: configfs: clear deactivation flag in configfs_composite_unbind() (git-fixes).\n- usb: hcd-pci: Use PCI_STD_NUM_BARS when checking standard BARs (bsc#1152489)\n- usb: misc: fix improper handling of refcount in uss720_probe() (git-fixes).\n- usb: mtu3: fix USB 3.0 dual-role-switch from device to host (git-fixes).\n- usb: musb: Fix missing of_node_put() in omap2430_probe (git-fixes).\n- usb: quirks: add a Realtek card reader (git-fixes).\n- usb: quirks: add STRING quirk for VCOM device (git-fixes).\n- usb: serial: cp210x: add PIDs for Kamstrup USB Meter Reader (git-fixes).\n- usb: serial: option: add Fibocom L610 modem (git-fixes).\n- usb: serial: option: add Fibocom MA510 modem (git-fixes).\n- usb: serial: option: add support for Cinterion MV32-WA/MV32-WB (git-fixes).\n- usb: serial: option: add Telit 0x1057, 0x1058, 0x1075 compositions (git-fixes).\n- usb: serial: pl2303: add device id for HP LM930 Display (git-fixes).\n- usb: serial: qcserial: add support for Sierra Wireless EM7590 (git-fixes).\n- usb: serial: whiteheat: fix heap overflow in WHITEHEAT_GET_DTR_RTS (git-fixes).\n- usb: storage: karma: fix rio_karma_init return (git-fixes).\n- usb: typec: mux: Check dev_set_name() return value (git-fixes).\n- usb: typec: tcpci: Do not skip cleanup in .remove() on error (git-fixes).\n- usb: typec: ucsi: Fix reuse of completion structure (git-fixes).\n- usb: typec: ucsi: Fix role swapping (git-fixes).\n- usb: usbip: add missing device lock on tweak configuration cmd (git-fixes).\n- usb: usbip: fix a refcount leak in stub_probe() (git-fixes).\n- video: fbdev: clcdfb: Fix refcount leak in clcdfb_of_vram_setup (git-fixes).\n- watchdog: ts4800_wdt: Fix refcount leak in ts4800_wdt_probe (git-fixes).\n- wifi: mac80211: fix use-after-free in chanctx code (git-fixes).\n- wireguard: device: check for metadata_dst with skb_valid_dst() (git-fixes).\n- xhci: increase usb U3 -> U0 link resume timeout from 100ms to 500ms (git-fixes).\n- xhci: stop polling roothubs after shutdown (git-fixes).\n",
            title: "Description of the patch",
         },
         {
            category: "details",
            text: "SUSE-2022-2079,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-2079,openSUSE-SLE-15.3-2022-2079",
            title: "Patchnames",
         },
         {
            category: "legal_disclaimer",
            text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
            title: "Terms of use",
         },
      ],
      publisher: {
         category: "vendor",
         contact_details: "https://www.suse.com/support/security/contact/",
         name: "SUSE Product Security Team",
         namespace: "https://www.suse.com/",
      },
      references: [
         {
            category: "external",
            summary: "SUSE ratings",
            url: "https://www.suse.com/support/security/rating/",
         },
         {
            category: "self",
            summary: "URL of this CSAF notice",
            url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2079-1.json",
         },
         {
            category: "self",
            summary: "URL for SUSE-SU-2022:2079-1",
            url: "https://www.suse.com/support/update/announcement/2022/suse-su-20222079-1/",
         },
         {
            category: "self",
            summary: "E-Mail link for SUSE-SU-2022:2079-1",
            url: "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011289.html",
         },
         {
            category: "self",
            summary: "SUSE Bug 1055117",
            url: "https://bugzilla.suse.com/1055117",
         },
         {
            category: "self",
            summary: "SUSE Bug 1061840",
            url: "https://bugzilla.suse.com/1061840",
         },
         {
            category: "self",
            summary: "SUSE Bug 1065729",
            url: "https://bugzilla.suse.com/1065729",
         },
         {
            category: "self",
            summary: "SUSE Bug 1103269",
            url: "https://bugzilla.suse.com/1103269",
         },
         {
            category: "self",
            summary: "SUSE Bug 1118212",
            url: "https://bugzilla.suse.com/1118212",
         },
         {
            category: "self",
            summary: "SUSE Bug 1152472",
            url: "https://bugzilla.suse.com/1152472",
         },
         {
            category: "self",
            summary: "SUSE Bug 1152489",
            url: "https://bugzilla.suse.com/1152489",
         },
         {
            category: "self",
            summary: "SUSE Bug 1153274",
            url: "https://bugzilla.suse.com/1153274",
         },
         {
            category: "self",
            summary: "SUSE Bug 1154353",
            url: "https://bugzilla.suse.com/1154353",
         },
         {
            category: "self",
            summary: "SUSE Bug 1156395",
            url: "https://bugzilla.suse.com/1156395",
         },
         {
            category: "self",
            summary: "SUSE Bug 1158266",
            url: "https://bugzilla.suse.com/1158266",
         },
         {
            category: "self",
            summary: "SUSE Bug 1167773",
            url: "https://bugzilla.suse.com/1167773",
         },
         {
            category: "self",
            summary: "SUSE Bug 1176447",
            url: "https://bugzilla.suse.com/1176447",
         },
         {
            category: "self",
            summary: "SUSE Bug 1178134",
            url: "https://bugzilla.suse.com/1178134",
         },
         {
            category: "self",
            summary: "SUSE Bug 1180100",
            url: "https://bugzilla.suse.com/1180100",
         },
         {
            category: "self",
            summary: "SUSE Bug 1183405",
            url: "https://bugzilla.suse.com/1183405",
         },
         {
            category: "self",
            summary: "SUSE Bug 1188885",
            url: "https://bugzilla.suse.com/1188885",
         },
         {
            category: "self",
            summary: "SUSE Bug 1195612",
            url: "https://bugzilla.suse.com/1195612",
         },
         {
            category: "self",
            summary: "SUSE Bug 1195651",
            url: "https://bugzilla.suse.com/1195651",
         },
         {
            category: "self",
            summary: "SUSE Bug 1195826",
            url: "https://bugzilla.suse.com/1195826",
         },
         {
            category: "self",
            summary: "SUSE Bug 1196426",
            url: "https://bugzilla.suse.com/1196426",
         },
         {
            category: "self",
            summary: "SUSE Bug 1196478",
            url: "https://bugzilla.suse.com/1196478",
         },
         {
            category: "self",
            summary: "SUSE Bug 1196570",
            url: "https://bugzilla.suse.com/1196570",
         },
         {
            category: "self",
            summary: "SUSE Bug 1196840",
            url: "https://bugzilla.suse.com/1196840",
         },
         {
            category: "self",
            summary: "SUSE Bug 1197446",
            url: "https://bugzilla.suse.com/1197446",
         },
         {
            category: "self",
            summary: "SUSE Bug 1197472",
            url: "https://bugzilla.suse.com/1197472",
         },
         {
            category: "self",
            summary: "SUSE Bug 1197601",
            url: "https://bugzilla.suse.com/1197601",
         },
         {
            category: "self",
            summary: "SUSE Bug 1197675",
            url: "https://bugzilla.suse.com/1197675",
         },
         {
            category: "self",
            summary: "SUSE Bug 1198438",
            url: "https://bugzilla.suse.com/1198438",
         },
         {
            category: "self",
            summary: "SUSE Bug 1198534",
            url: "https://bugzilla.suse.com/1198534",
         },
         {
            category: "self",
            summary: "SUSE Bug 1198577",
            url: "https://bugzilla.suse.com/1198577",
         },
         {
            category: "self",
            summary: "SUSE Bug 1198971",
            url: "https://bugzilla.suse.com/1198971",
         },
         {
            category: "self",
            summary: "SUSE Bug 1198989",
            url: "https://bugzilla.suse.com/1198989",
         },
         {
            category: "self",
            summary: "SUSE Bug 1199035",
            url: "https://bugzilla.suse.com/1199035",
         },
         {
            category: "self",
            summary: "SUSE Bug 1199052",
            url: "https://bugzilla.suse.com/1199052",
         },
         {
            category: "self",
            summary: "SUSE Bug 1199063",
            url: "https://bugzilla.suse.com/1199063",
         },
         {
            category: "self",
            summary: "SUSE Bug 1199114",
            url: "https://bugzilla.suse.com/1199114",
         },
         {
            category: "self",
            summary: "SUSE Bug 1199314",
            url: "https://bugzilla.suse.com/1199314",
         },
         {
            category: "self",
            summary: "SUSE Bug 1199505",
            url: "https://bugzilla.suse.com/1199505",
         },
         {
            category: "self",
            summary: "SUSE Bug 1199507",
            url: "https://bugzilla.suse.com/1199507",
         },
         {
            category: "self",
            summary: "SUSE Bug 1199564",
            url: "https://bugzilla.suse.com/1199564",
         },
         {
            category: "self",
            summary: "SUSE Bug 1199626",
            url: "https://bugzilla.suse.com/1199626",
         },
         {
            category: "self",
            summary: "SUSE Bug 1199631",
            url: "https://bugzilla.suse.com/1199631",
         },
         {
            category: "self",
            summary: "SUSE Bug 1199650",
            url: "https://bugzilla.suse.com/1199650",
         },
         {
            category: "self",
            summary: "SUSE Bug 1199670",
            url: "https://bugzilla.suse.com/1199670",
         },
         {
            category: "self",
            summary: "SUSE Bug 1199839",
            url: "https://bugzilla.suse.com/1199839",
         },
         {
            category: "self",
            summary: "SUSE Bug 1200019",
            url: "https://bugzilla.suse.com/1200019",
         },
         {
            category: "self",
            summary: "SUSE Bug 1200045",
            url: "https://bugzilla.suse.com/1200045",
         },
         {
            category: "self",
            summary: "SUSE Bug 1200046",
            url: "https://bugzilla.suse.com/1200046",
         },
         {
            category: "self",
            summary: "SUSE Bug 1200192",
            url: "https://bugzilla.suse.com/1200192",
         },
         {
            category: "self",
            summary: "SUSE Bug 1200216",
            url: "https://bugzilla.suse.com/1200216",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-19377 page",
            url: "https://www.suse.com/security/cve/CVE-2019-19377/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2021-33061 page",
            url: "https://www.suse.com/security/cve/CVE-2021-33061/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2022-0168 page",
            url: "https://www.suse.com/security/cve/CVE-2022-0168/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2022-1184 page",
            url: "https://www.suse.com/security/cve/CVE-2022-1184/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2022-1652 page",
            url: "https://www.suse.com/security/cve/CVE-2022-1652/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2022-1729 page",
            url: "https://www.suse.com/security/cve/CVE-2022-1729/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2022-1972 page",
            url: "https://www.suse.com/security/cve/CVE-2022-1972/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2022-20008 page",
            url: "https://www.suse.com/security/cve/CVE-2022-20008/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2022-21123 page",
            url: "https://www.suse.com/security/cve/CVE-2022-21123/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2022-21125 page",
            url: "https://www.suse.com/security/cve/CVE-2022-21125/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2022-21127 page",
            url: "https://www.suse.com/security/cve/CVE-2022-21127/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2022-21166 page",
            url: "https://www.suse.com/security/cve/CVE-2022-21166/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2022-21180 page",
            url: "https://www.suse.com/security/cve/CVE-2022-21180/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2022-24448 page",
            url: "https://www.suse.com/security/cve/CVE-2022-24448/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2022-30594 page",
            url: "https://www.suse.com/security/cve/CVE-2022-30594/",
         },
      ],
      title: "Security update for the Linux Kernel",
      tracking: {
         current_release_date: "2022-06-14T18:32:08Z",
         generator: {
            date: "2022-06-14T18:32:08Z",
            engine: {
               name: "cve-database.git:bin/generate-csaf.pl",
               version: "1",
            },
         },
         id: "SUSE-SU-2022:2079-1",
         initial_release_date: "2022-06-14T18:32:08Z",
         revision_history: [
            {
               date: "2022-06-14T18:32:08Z",
               number: "1",
               summary: "Current version",
            },
         ],
         status: "final",
         version: "1",
      },
   },
   product_tree: {
      branches: [
         {
            branches: [
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                        product: {
                           name: "kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                           product_id: "kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                        product: {
                           name: "kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                           product_id: "kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "noarch",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                        product: {
                           name: "cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                           product_id: "cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                        product: {
                           name: "dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                           product_id: "dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                        product: {
                           name: "gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                           product_id: "gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-azure-5.3.18-150300.38.59.1.x86_64",
                        product: {
                           name: "kernel-azure-5.3.18-150300.38.59.1.x86_64",
                           product_id: "kernel-azure-5.3.18-150300.38.59.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                        product: {
                           name: "kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                           product_id: "kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
                        product: {
                           name: "kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
                           product_id: "kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
                        product: {
                           name: "kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
                           product_id: "kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
                        product: {
                           name: "kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
                           product_id: "kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                        product: {
                           name: "kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                           product_id: "kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                        product: {
                           name: "kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                           product_id: "kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                        product: {
                           name: "ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                           product_id: "ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                        product: {
                           name: "reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                           product_id: "reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "x86_64",
               },
               {
                  branches: [
                     {
                        category: "product_name",
                        name: "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
                        product: {
                           name: "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
                           product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
                           product_identification_helper: {
                              cpe: "cpe:/o:suse:sle-module-public-cloud:15:sp3",
                           },
                        },
                     },
                     {
                        category: "product_name",
                        name: "openSUSE Leap 15.3",
                        product: {
                           name: "openSUSE Leap 15.3",
                           product_id: "openSUSE Leap 15.3",
                           product_identification_helper: {
                              cpe: "cpe:/o:opensuse:leap:15.3",
                           },
                        },
                     },
                  ],
                  category: "product_family",
                  name: "SUSE Linux Enterprise",
               },
            ],
            category: "vendor",
            name: "SUSE",
         },
      ],
      relationships: [
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-azure-5.3.18-150300.38.59.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
               product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
            },
            product_reference: "kernel-azure-5.3.18-150300.38.59.1.x86_64",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-azure-devel-5.3.18-150300.38.59.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
               product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
            },
            product_reference: "kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-devel-azure-5.3.18-150300.38.59.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
               product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
            },
            product_reference: "kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-source-azure-5.3.18-150300.38.59.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
               product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
            },
            product_reference: "kernel-source-azure-5.3.18-150300.38.59.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-syms-azure-5.3.18-150300.38.59.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
               product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
            },
            product_reference: "kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64 as component of openSUSE Leap 15.3",
               product_id: "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
            },
            product_reference: "cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64 as component of openSUSE Leap 15.3",
               product_id: "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
            },
            product_reference: "dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64 as component of openSUSE Leap 15.3",
               product_id: "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
            },
            product_reference: "gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-azure-5.3.18-150300.38.59.1.x86_64 as component of openSUSE Leap 15.3",
               product_id: "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
            },
            product_reference: "kernel-azure-5.3.18-150300.38.59.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-azure-devel-5.3.18-150300.38.59.1.x86_64 as component of openSUSE Leap 15.3",
               product_id: "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
            },
            product_reference: "kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-azure-extra-5.3.18-150300.38.59.1.x86_64 as component of openSUSE Leap 15.3",
               product_id: "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
            },
            product_reference: "kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64 as component of openSUSE Leap 15.3",
               product_id: "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
            },
            product_reference: "kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-azure-optional-5.3.18-150300.38.59.1.x86_64 as component of openSUSE Leap 15.3",
               product_id: "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
            },
            product_reference: "kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-devel-azure-5.3.18-150300.38.59.1.noarch as component of openSUSE Leap 15.3",
               product_id: "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
            },
            product_reference: "kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
            relates_to_product_reference: "openSUSE Leap 15.3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-source-azure-5.3.18-150300.38.59.1.noarch as component of openSUSE Leap 15.3",
               product_id: "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
            },
            product_reference: "kernel-source-azure-5.3.18-150300.38.59.1.noarch",
            relates_to_product_reference: "openSUSE Leap 15.3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-syms-azure-5.3.18-150300.38.59.1.x86_64 as component of openSUSE Leap 15.3",
               product_id: "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
            },
            product_reference: "kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64 as component of openSUSE Leap 15.3",
               product_id: "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
            },
            product_reference: "kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64 as component of openSUSE Leap 15.3",
               product_id: "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
            },
            product_reference: "ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64 as component of openSUSE Leap 15.3",
               product_id: "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
            },
            product_reference: "reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.3",
         },
      ],
   },
   vulnerabilities: [
      {
         cve: "CVE-2019-19377",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-19377",
            },
         ],
         notes: [
            {
               category: "general",
               text: "In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image, performing some operations, and unmounting can lead to a use-after-free in btrfs_queue_work in fs/btrfs/async-thread.c.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-19377",
               url: "https://www.suse.com/security/cve/CVE-2019-19377",
            },
            {
               category: "external",
               summary: "SUSE Bug 1158266 for CVE-2019-19377",
               url: "https://bugzilla.suse.com/1158266",
            },
            {
               category: "external",
               summary: "SUSE Bug 1162338 for CVE-2019-19377",
               url: "https://bugzilla.suse.com/1162338",
            },
            {
               category: "external",
               summary: "SUSE Bug 1162369 for CVE-2019-19377",
               url: "https://bugzilla.suse.com/1162369",
            },
            {
               category: "external",
               summary: "SUSE Bug 1173871 for CVE-2019-19377",
               url: "https://bugzilla.suse.com/1173871",
            },
            {
               category: "external",
               summary: "SUSE Bug 1211495 for CVE-2019-19377",
               url: "https://bugzilla.suse.com/1211495",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-06-14T18:32:08Z",
               details: "important",
            },
         ],
         title: "CVE-2019-19377",
      },
      {
         cve: "CVE-2021-33061",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2021-33061",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters may allow an authenticated user to potentially enable denial of service via local access.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2021-33061",
               url: "https://www.suse.com/security/cve/CVE-2021-33061",
            },
            {
               category: "external",
               summary: "SUSE Bug 1196426 for CVE-2021-33061",
               url: "https://bugzilla.suse.com/1196426",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-06-14T18:32:08Z",
               details: "moderate",
            },
         ],
         title: "CVE-2021-33061",
      },
      {
         cve: "CVE-2022-0168",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2022-0168",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A denial of service (DOS) issue was found in the Linux kernel's smb2_ioctl_query_info function in the fs/cifs/smb2ops.c Common Internet File System (CIFS) due to an incorrect return from the memdup_user function. This flaw allows a local, privileged (CAP_SYS_ADMIN) attacker to crash the system.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2022-0168",
               url: "https://www.suse.com/security/cve/CVE-2022-0168",
            },
            {
               category: "external",
               summary: "SUSE Bug 1197472 for CVE-2022-0168",
               url: "https://bugzilla.suse.com/1197472",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.4,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-06-14T18:32:08Z",
               details: "moderate",
            },
         ],
         title: "CVE-2022-0168",
      },
      {
         cve: "CVE-2022-1184",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2022-1184",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel's filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2022-1184",
               url: "https://www.suse.com/security/cve/CVE-2022-1184",
            },
            {
               category: "external",
               summary: "SUSE Bug 1198577 for CVE-2022-1184",
               url: "https://bugzilla.suse.com/1198577",
            },
            {
               category: "external",
               summary: "SUSE Bug 1210859 for CVE-2022-1184",
               url: "https://bugzilla.suse.com/1210859",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-06-14T18:32:08Z",
               details: "moderate",
            },
         ],
         title: "CVE-2022-1184",
      },
      {
         cve: "CVE-2022-1652",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2022-1652",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a concurrency use-after-free flaw in the bad_flp_intr function. By executing a specially-crafted program, an attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2022-1652",
               url: "https://www.suse.com/security/cve/CVE-2022-1652",
            },
            {
               category: "external",
               summary: "SUSE Bug 1199063 for CVE-2022-1652",
               url: "https://bugzilla.suse.com/1199063",
            },
            {
               category: "external",
               summary: "SUSE Bug 1200057 for CVE-2022-1652",
               url: "https://bugzilla.suse.com/1200057",
            },
            {
               category: "external",
               summary: "SUSE Bug 1200751 for CVE-2022-1652",
               url: "https://bugzilla.suse.com/1200751",
            },
            {
               category: "external",
               summary: "SUSE Bug 1201034 for CVE-2022-1652",
               url: "https://bugzilla.suse.com/1201034",
            },
            {
               category: "external",
               summary: "SUSE Bug 1201832 for CVE-2022-1652",
               url: "https://bugzilla.suse.com/1201832",
            },
            {
               category: "external",
               summary: "SUSE Bug 1204132 for CVE-2022-1652",
               url: "https://bugzilla.suse.com/1204132",
            },
            {
               category: "external",
               summary: "SUSE Bug 1212307 for CVE-2022-1652",
               url: "https://bugzilla.suse.com/1212307",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-06-14T18:32:08Z",
               details: "moderate",
            },
         ],
         title: "CVE-2022-1652",
      },
      {
         cve: "CVE-2022-1729",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2022-1729",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2022-1729",
               url: "https://www.suse.com/security/cve/CVE-2022-1729",
            },
            {
               category: "external",
               summary: "SUSE Bug 1199507 for CVE-2022-1729",
               url: "https://bugzilla.suse.com/1199507",
            },
            {
               category: "external",
               summary: "SUSE Bug 1199697 for CVE-2022-1729",
               url: "https://bugzilla.suse.com/1199697",
            },
            {
               category: "external",
               summary: "SUSE Bug 1201832 for CVE-2022-1729",
               url: "https://bugzilla.suse.com/1201832",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.2,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-06-14T18:32:08Z",
               details: "important",
            },
         ],
         title: "CVE-2022-1729",
      },
      {
         cve: "CVE-2022-1972",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2022-1972",
            },
         ],
         notes: [
            {
               category: "general",
               text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2078. Reason: This candidate is a reservation duplicate of CVE-2022-2078. Notes: All CVE users should reference CVE-2022-2078 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2022-1972",
               url: "https://www.suse.com/security/cve/CVE-2022-1972",
            },
            {
               category: "external",
               summary: "SUSE Bug 1200019 for CVE-2022-1972",
               url: "https://bugzilla.suse.com/1200019",
            },
            {
               category: "external",
               summary: "SUSE Bug 1200266 for CVE-2022-1972",
               url: "https://bugzilla.suse.com/1200266",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-06-14T18:32:08Z",
               details: "moderate",
            },
         ],
         title: "CVE-2022-1972",
      },
      {
         cve: "CVE-2022-20008",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2022-20008",
            },
         ],
         notes: [
            {
               category: "general",
               text: "In mmc_blk_read_single of block.c, there is a possible way to read kernel heap memory due to uninitialized data. This could lead to local information disclosure if reading from an SD card that triggers errors, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-216481035References: Upstream kernel",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2022-20008",
               url: "https://www.suse.com/security/cve/CVE-2022-20008",
            },
            {
               category: "external",
               summary: "SUSE Bug 1199564 for CVE-2022-20008",
               url: "https://bugzilla.suse.com/1199564",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.2,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-06-14T18:32:08Z",
               details: "moderate",
            },
         ],
         title: "CVE-2022-20008",
      },
      {
         cve: "CVE-2022-21123",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2022-21123",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2022-21123",
               url: "https://www.suse.com/security/cve/CVE-2022-21123",
            },
            {
               category: "external",
               summary: "SUSE Bug 1199650 for CVE-2022-21123",
               url: "https://bugzilla.suse.com/1199650",
            },
            {
               category: "external",
               summary: "SUSE Bug 1200549 for CVE-2022-21123",
               url: "https://bugzilla.suse.com/1200549",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209075 for CVE-2022-21123",
               url: "https://bugzilla.suse.com/1209075",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.1,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-06-14T18:32:08Z",
               details: "moderate",
            },
         ],
         title: "CVE-2022-21123",
      },
      {
         cve: "CVE-2022-21125",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2022-21125",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2022-21125",
               url: "https://www.suse.com/security/cve/CVE-2022-21125",
            },
            {
               category: "external",
               summary: "SUSE Bug 1199650 for CVE-2022-21125",
               url: "https://bugzilla.suse.com/1199650",
            },
            {
               category: "external",
               summary: "SUSE Bug 1200549 for CVE-2022-21125",
               url: "https://bugzilla.suse.com/1200549",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209074 for CVE-2022-21125",
               url: "https://bugzilla.suse.com/1209074",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.6,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-06-14T18:32:08Z",
               details: "moderate",
            },
         ],
         title: "CVE-2022-21125",
      },
      {
         cve: "CVE-2022-21127",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2022-21127",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Incomplete cleanup in specific special register read operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2022-21127",
               url: "https://www.suse.com/security/cve/CVE-2022-21127",
            },
            {
               category: "external",
               summary: "SUSE Bug 1199650 for CVE-2022-21127",
               url: "https://bugzilla.suse.com/1199650",
            },
            {
               category: "external",
               summary: "SUSE Bug 1200549 for CVE-2022-21127",
               url: "https://bugzilla.suse.com/1200549",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-06-14T18:32:08Z",
               details: "moderate",
            },
         ],
         title: "CVE-2022-21127",
      },
      {
         cve: "CVE-2022-21166",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2022-21166",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2022-21166",
               url: "https://www.suse.com/security/cve/CVE-2022-21166",
            },
            {
               category: "external",
               summary: "SUSE Bug 1199650 for CVE-2022-21166",
               url: "https://bugzilla.suse.com/1199650",
            },
            {
               category: "external",
               summary: "SUSE Bug 1200549 for CVE-2022-21166",
               url: "https://bugzilla.suse.com/1200549",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209073 for CVE-2022-21166",
               url: "https://bugzilla.suse.com/1209073",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-06-14T18:32:08Z",
               details: "moderate",
            },
         ],
         title: "CVE-2022-21166",
      },
      {
         cve: "CVE-2022-21180",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2022-21180",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Improper input validation for some Intel(R) Processors may allow an authenticated user to potentially cause a denial of service via local access.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2022-21180",
               url: "https://www.suse.com/security/cve/CVE-2022-21180",
            },
            {
               category: "external",
               summary: "SUSE Bug 1199650 for CVE-2022-21180",
               url: "https://bugzilla.suse.com/1199650",
            },
            {
               category: "external",
               summary: "SUSE Bug 1200549 for CVE-2022-21180",
               url: "https://bugzilla.suse.com/1200549",
            },
            {
               category: "external",
               summary: "SUSE Bug 1212313 for CVE-2022-21180",
               url: "https://bugzilla.suse.com/1212313",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-06-14T18:32:08Z",
               details: "moderate",
            },
         ],
         title: "CVE-2022-21180",
      },
      {
         cve: "CVE-2022-24448",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2022-24448",
            },
         ],
         notes: [
            {
               category: "general",
               text: "An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2022-24448",
               url: "https://www.suse.com/security/cve/CVE-2022-24448",
            },
            {
               category: "external",
               summary: "SUSE Bug 1195612 for CVE-2022-24448",
               url: "https://bugzilla.suse.com/1195612",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-06-14T18:32:08Z",
               details: "moderate",
            },
         ],
         title: "CVE-2022-24448",
      },
      {
         cve: "CVE-2022-30594",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2022-30594",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2022-30594",
               url: "https://www.suse.com/security/cve/CVE-2022-30594",
            },
            {
               category: "external",
               summary: "SUSE Bug 1199505 for CVE-2022-30594",
               url: "https://bugzilla.suse.com/1199505",
            },
            {
               category: "external",
               summary: "SUSE Bug 1199602 for CVE-2022-30594",
               url: "https://bugzilla.suse.com/1199602",
            },
            {
               category: "external",
               summary: "SUSE Bug 1201549 for CVE-2022-30594",
               url: "https://bugzilla.suse.com/1201549",
            },
            {
               category: "external",
               summary: "SUSE Bug 1204132 for CVE-2022-30594",
               url: "https://bugzilla.suse.com/1204132",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.4,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.59.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.59.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.59.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-06-14T18:32:08Z",
               details: "important",
            },
         ],
         title: "CVE-2022-30594",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.