Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-25258
Vulnerability from cvelistv5
Published
2022-02-16 00:00
Modified
2024-08-03 04:36
Severity ?
EPSS score ?
Summary
An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T04:36:06.563Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://github.com/torvalds/linux/commit/75e5b4849b81e19e9efe1654b30d7f3151c33c2c", }, { tags: [ "x_transferred", ], url: "https://github.com/szymonh/d-os-descriptor", }, { tags: [ "x_transferred", ], url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10", }, { name: "FEDORA-2022-9d4e48836d", tags: [ "vendor-advisory", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TCW2KZYJ2H6BKZE3CVLHRIXYDGNYYC5P/", }, { name: "DSA-5092", tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.debian.org/security/2022/dsa-5092", }, { name: "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html", }, { name: "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html", }, { name: "DSA-5096", tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.debian.org/security/2022/dsa-5096", }, { tags: [ "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20221028-0007/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-10-28T00:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://github.com/torvalds/linux/commit/75e5b4849b81e19e9efe1654b30d7f3151c33c2c", }, { url: "https://github.com/szymonh/d-os-descriptor", }, { url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10", }, { name: "FEDORA-2022-9d4e48836d", tags: [ "vendor-advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TCW2KZYJ2H6BKZE3CVLHRIXYDGNYYC5P/", }, { name: "DSA-5092", tags: [ "vendor-advisory", ], url: "https://www.debian.org/security/2022/dsa-5092", }, { name: "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update", tags: [ "mailing-list", ], url: "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html", }, { name: "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", tags: [ "mailing-list", ], url: "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html", }, { name: "DSA-5096", tags: [ "vendor-advisory", ], url: "https://www.debian.org/security/2022/dsa-5096", }, { url: "https://security.netapp.com/advisory/ntap-20221028-0007/", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2022-25258", datePublished: "2022-02-16T00:00:00", dateReserved: "2022-02-16T00:00:00", dateUpdated: "2024-08-03T04:36:06.563Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2022-25258\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2022-02-16T20:15:07.517\",\"lastModified\":\"2024-11-21T06:51:53.473\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.\"},{\"lang\":\"es\",\"value\":\"Se ha descubierto un problema en drivers/usb/gadget/composite.c en el kernel de Linux anterior a la versión 5.16.10. El subsistema USB Gadget carece de cierta validación de las solicitudes de descriptor del SO de la interfaz (las que tienen un índice de matriz grande y las asociadas a la recuperación de punteros de función NULL). Podría producirse una corrupción de memoria\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":4.6,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"PHYSICAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":4.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.16.10\",\"matchCriteriaId\":\"6FADC79F-20B6-4353-B8FF-03CDC52EFBE4\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*\",\"matchCriteriaId\":\"3A756737-1CC4-42C2-A4DF-E1C893B4E2D5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6770B6C3-732E-4E22-BF1C-2D2FD610061C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F9C8C20-42EB-4AB5-BD97-212DEB070C43\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FFF7106-ED78-49BA-9EC5-B889E3685D53\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E63D8B0F-006E-4801-BF9D-1C001BBFB4F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56409CEC-5A1E-4450-AA42-641E459CC2AF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B06F4839-D16A-4A61-9BB5-55B13F41E47F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0B4AD8A-F172-4558-AEC6-FF424BA2D912\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8497A4C9-8474-4A62-8331-3FE862ED4098\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDDF61B7-EC5C-467C-B710-B89F502CD04F\"}]}]}],\"references\":[{\"url\":\"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/szymonh/d-os-descriptor\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/75e5b4849b81e19e9efe1654b30d7f3151c33c2c\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TCW2KZYJ2H6BKZE3CVLHRIXYDGNYYC5P/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20221028-0007/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2022/dsa-5092\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2022/dsa-5096\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/szymonh/d-os-descriptor\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/75e5b4849b81e19e9efe1654b30d7f3151c33c2c\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TCW2KZYJ2H6BKZE3CVLHRIXYDGNYYC5P/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20221028-0007/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2022/dsa-5092\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2022/dsa-5096\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", }, }
suse-su-2022:1037-1
Vulnerability from csaf_suse
Published
2022-03-30 07:36
Modified
2022-03-30 07:36
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-25636: Fixed an issue which allowed a local users to gain privileges because of a heap out-of-bounds write in nf_dup_netdev.c, related to nf_tables_offload (bsc#1196299).
- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could trigger crash the system or corrupt system memory (bsc#1196830).
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-24448: Fixed an issue if an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd(). (bsc#1196155)
- CVE-2022-25258: The USB Gadget subsystem lacked certain validation of interface OS descriptor requests, which could have lead to memory corruption (bsc#1196096).
- CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev->buf release (bsc#1195905).
- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free vulnerability in unix_scm_to_skb of af_unix (bsc#1193731).
- CVE-2021-39657: Fixed an information leak in the Universal Flash Storage subsystem (bsc#1193864).
The following non-security bugs were fixed:
- ALSA: intel_hdmi: Fix reference to PCM buffer address (git-fixes).
- ARM: 9182/1: mmu: fix returns from early_param() and __setup() functions (git-fixes).
- ARM: Fix kgdb breakpoint for Thumb2 (git-fixes).
- ASoC: cs4265: Fix the duplicated control name (git-fixes).
- ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min (git-fixes).
- ASoC: rt5668: do not block workqueue if card is unbound (git-fixes).
- ASoC: rt5682: do not block workqueue if card is unbound (git-fixes).
- Bluetooth: btusb: Add missing Chicony device for Realtek RTL8723BE (bsc#1196779).
- EDAC/altera: Fix deferred probing (bsc#1178134).
- HID: add mapping for KEY_ALL_APPLICATIONS (git-fixes).
- HID: add mapping for KEY_DICTATE (git-fixes).
- Hand over the maintainership to SLE15-SP3 maintainers
- IB/hfi1: Correct guard on eager buffer deallocation (git-fixes).
- IB/hfi1: Fix early init panic (git-fixes).
- IB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr (git-fixes).
- IB/hfi1: Insure use of smp_processor_id() is preempt disabled (git-fixes).
- IB/rdmavt: Validate remote_addr during loopback atomic tests (git-fixes).
- Input: clear BTN_RIGHT/MIDDLE on buttonpads (git-fixes).
- Input: elan_i2c - fix regulator enable count imbalance after suspend/resume (git-fixes).
- Input: elan_i2c - move regulator_[en|dis]able() out of elan_[en|dis]able_power() (git-fixes).
- RDMA/bnxt_re: Scan the whole bitmap when checking if 'disabling RCFW with pending cmd-bit' (git-fixes).
- RDMA/cma: Do not change route.addr.src_addr outside state checks (bsc#1181147).
- RDMA/cma: Let cma_resolve_ib_dev() continue search even after empty entry (git-fixes).
- RDMA/cma: Remove open coding of overflow checking for private_data_len (git-fixes).
- RDMA/core: Do not infoleak GRH fields (git-fixes).
- RDMA/core: Let ib_find_gid() continue search even after empty entry (git-fixes).
- RDMA/cxgb4: Set queue pair state when being queried (git-fixes).
- RDMA/hns: Validate the pkey index (git-fixes).
- RDMA/ib_srp: Fix a deadlock (git-fixes).
- RDMA/mlx4: Do not continue event handler after memory allocation failure (git-fixes).
- RDMA/rtrs-clt: Fix possible double free in error case (jsc#SLE-15176).
- RDMA/rxe: Fix a typo in opcode name (git-fixes).
- RDMA/siw: Fix broken RDMA Read Fence/Resume logic (git-fixes).
- RDMA/uverbs: Check for null return of kmalloc_array (git-fixes).
- RDMA/uverbs: Remove the unnecessary assignment (git-fixes).
- Revert 'USB: serial: ch341: add new Product ID for CH341A' (git-fixes).
- SUNRPC: avoid race between mod_timer() and del_timer_sync() (bnc#1195403).
- USB: gadget: validate endpoint index for xilinx udc (git-fixes).
- USB: gadget: validate interface OS descriptor requests (git-fixes).
- USB: hub: Clean up use of port initialization schemes and retries (git-fixes).
- USB: serial: option: add Telit LE910R1 compositions (git-fixes).
- USB: serial: option: add support for DW5829e (git-fixes).
- USB: zaurus: support another broken Zaurus (git-fixes).
- arm64: dts: rockchip: Switch RK3399-Gru DP to SPDIF output (git-fixes).
- asix: fix uninit-value in asix_mdio_read() (git-fixes).
- ata: pata_hpt37x: disable primary channel on HPT371 (git-fixes).
- batman-adv: Do not expect inter-netns unique iflink indices (git-fixes).
- batman-adv: Request iflink once in batadv-on-batadv check (git-fixes).
- batman-adv: Request iflink once in batadv_get_real_netdevice (git-fixes).
- blk-mq: do not free tags if the tag_set is used by other device in queue initialztion (bsc#1193787).
- bnxt_en: Fix active FEC reporting to ethtool (jsc#SLE-16649).
- bnxt_en: Fix incorrect multicast rx mask setting when not requested (git-fixes).
- bnxt_en: Fix occasional ethtool -t loopback test failures (git-fixes).
- bnxt_en: Fix offline ethtool selftest with RDMA enabled (git-fixes).
- bonding: force carrier update when releasing slave (git-fixes).
- can: gs_usb: change active_channels's type from atomic_t to u8 (git-fixes).
- cgroup-v1: Correct privileges check in release_agent writes (bsc#1196723).
- cgroup/cpuset: Fix 'suspicious RCU usage' lockdep warning (bsc#1196868).
- clk: jz4725b: fix mmc0 clock gating (git-fixes).
- cpufreq: schedutil: Use kobject release() method to free (git-fixes)
- cpuset: Fix the bug that subpart_cpus updated wrongly in update_cpumask() (bsc#1196866).
- cputime, cpuacct: Include guest time in user time in (git-fixes)
- dma-direct: Fix potential NULL pointer dereference (bsc#1196472 ltc#192278).
- dma-mapping: Allow mixing bypass and mapped DMA operation (bsc#1196472 ltc#192278).
- dmaengine: shdma: Fix runtime PM imbalance on error (git-fixes).
- drm/amdgpu: disable MMHUB PG for Picasso (git-fixes).
- drm/edid: Always set RGB444 (git-fixes).
- drm/i915/dg1: Wait for pcode/uncore handshake at startup (bsc#1195211).
- drm/i915/gen11+: Only load DRAM information from pcode (bsc#1195211).
- drm/i915: Nuke not needed members of dram_info (bsc#1195211).
- drm/i915: Remove memory frequency calculation (bsc#1195211).
- drm/i915: Rename is_16gb_dimm to wm_lv_0_adjust_needed (bsc#1195211).
- efivars: Respect 'block' flag in efivar_entry_set_safe() (git-fixes).
- exfat: fix i_blocks for files truncated over 4 GiB (git-fixes).
- exfat: fix incorrect loading of i_blocks for large files (git-fixes).
- firmware: arm_scmi: Remove space in MODULE_ALIAS name (git-fixes).
- gpio: rockchip: Reset int_bothedge when changing trigger (git-fixes).
- gpio: tegra186: Fix chip_data type confusion (git-fixes).
- gtp: remove useless rcu_read_lock() (git-fixes).
- hamradio: fix macro redefine warning (git-fixes).
- i2c: bcm2835: Avoid clock stretching timeouts (git-fixes).
- iavf: Fix missing check for running netdev (git-fixes).
- ice: initialize local variable 'tlv' (jsc#SLE-12878).
- igc: igc_read_phy_reg_gpy: drop premature return (git-fixes).
- igc: igc_write_phy_reg_gpy: drop premature return (git-fixes).
- iio: Fix error handling for PM (git-fixes).
- iio: adc: ad7124: fix mask used for setting AIN_BUFP & AIN_BUFM bits (git-fixes).
- iio: adc: men_z188_adc: Fix a resource leak in an error handling path (git-fixes).
- ixgbe: xsk: change !netif_carrier_ok() handling in ixgbe_xmit_zc() (git-fixes).
- mac80211: fix forwarded mesh frames AC & queue selection (git-fixes).
- mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work (git-fixes).
- mac80211_hwsim: report NOACK frames in tx_status (git-fixes).
- mask out added spinlock in rndis_params (git-fixes).
- net/mlx5: Fix possible deadlock on rule deletion (git-fixes).
- net/mlx5: Fix wrong limitation of metadata match on ecpf (git-fixes).
- net/mlx5: Update the list of the PCI supported devices (git-fixes).
- net/mlx5: Update the list of the PCI supported devices (git-fixes).
- net/mlx5e: Fix modify header actions memory leak (git-fixes).
- net/mlx5e: Fix page DMA map/unmap attributes (bsc#1196468).
- net/mlx5e: Fix wrong return value on ioctl EEPROM query failure (git-fixes).
- net/mlx5e: TC, Reject rules with drop and modify hdr action (git-fixes).
- net/mlx5e: TC, Reject rules with forward and drop actions (git-fixes).
- net/mlx5e: kTLS, Use CHECKSUM_UNNECESSARY for device-offloaded packets (jsc#SLE-15172).
- net/sched: act_ct: Fix flow table lookup after ct clear or switching zones (jsc#SLE-15172).
- net: dsa: mv88e6xxx: MV88E6097 does not support jumbo configuration (git-fixes).
- net: ethernet: ti: cpsw: disable PTPv1 hw timestamping advertisement (git-fixes).
- net: fix up skbs delta_truesize in UDP GRO frag_list (bsc#1176447).
- net: hns3: Clear the CMDQ registers before unmapping BAR region (git-fixes).
- net: sfc: Replace in_interrupt() usage (git-fixes).
- net: tipc: validate domain record count on input (bsc#1195254).
- net: usb: cdc_mbim: avoid altsetting toggling for Telit FN990 (git-fixes).
- netfilter: nf_tables: fix memory leak during stateful obj update (bsc#1176447).
- netsec: ignore 'phy-mode' device property on ACPI systems (git-fixes).
- nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() (git-fixes).
- nl80211: Handle nla_memdup failures in handle_nan_filter (git-fixes).
- ntb: intel: fix port config status offset for SPR (git-fixes).
- nvme-multipath: use vmalloc for ANA log buffer (bsc#1193787).
- nvme-rdma: fix possible use-after-free in transport error_recovery work (git-fixes).
- nvme-tcp: fix possible use-after-free in transport error_recovery work (git-fixes).
- nvme: fix a possible use-after-free in controller reset during load (git-fixes).
- powerpc/dma: Fallback to dma_ops when persistent memory present (bsc#1196472 ltc#192278). Update config files.
- powerpc/fadump: register for fadump as early as possible (bsc#1179439 ltc#190038).
- powerpc/mm: Remove dcache flush from memory remove (bsc#1196433 ltc#196449).
- powerpc/powernv/memtrace: Fix dcache flushing (bsc#1196433 ltc#196449).
- powerpc/pseries/iommu: Fix window size for direct mapping with pmem (bsc#1196472 ltc#192278).
- sched/core: Mitigate race (git-fixes)
- scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() (git-fixes).
- scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe (git-fixes).
- scsi: lpfc: Terminate string in lpfc_debugfs_nvmeio_trc_write() (git-fixes).
- scsi: nsp_cs: Check of ioremap return value (git-fixes).
- scsi: qedf: Fix potential dereference of NULL pointer (git-fixes).
- scsi: smartpqi: Add PCI IDs (bsc#1196627).
- scsi: ufs: Fix race conditions related to driver data (git-fixes).
- selftests: mlxsw: tc_police_scale: Make test more robust (bsc#1176774).
- soc: fsl: Correct MAINTAINERS database (QUICC ENGINE LIBRARY) (git-fixes).
- soc: fsl: Correct MAINTAINERS database (SOC) (git-fixes).
- soc: fsl: qe: Check of ioremap return value (git-fixes).
- spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op() (git-fixes).
- sr9700: sanity check for packet length (bsc#1196836).
- tracing: Fix return value of __setup handlers (git-fixes).
- tty: n_gsm: fix encoding of control signal octet bit DV (git-fixes).
- tty: n_gsm: fix proper link termination after failed open (git-fixes).
- usb: dwc2: use well defined macros for power_down (git-fixes).
- usb: dwc3: gadget: Let the interrupt handler disable bottom halves (git-fixes).
- usb: dwc3: pci: Fix Bay Trail phy GPIO mappings (git-fixes).
- usb: gadget: rndis: add spinlock for rndis response list (git-fixes).
- usb: hub: Fix usb enumeration issue due to address0 race (git-fixes).
- vrf: Fix fast path output packet handling with async Netfilter rules (git-fixes).
- xhci: Prevent futile URB re-submissions due to incorrect return value (git-fixes).
- xhci: re-initialize the HC during resume if HCE was set (git-fixes).
Patchnames
SUSE-2022-1037,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-1037
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-25636: Fixed an issue which allowed a local users to gain privileges because of a heap out-of-bounds write in nf_dup_netdev.c, related to nf_tables_offload (bsc#1196299).\n- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could trigger crash the system or corrupt system memory (bsc#1196830).\n- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).\n- CVE-2022-24448: Fixed an issue if an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).\n- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)\n- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd(). (bsc#1196155)\n- CVE-2022-25258: The USB Gadget subsystem lacked certain validation of interface OS descriptor requests, which could have lead to memory corruption (bsc#1196096).\n- CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev->buf release (bsc#1195905).\n- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).\n- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).\n- CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free vulnerability in unix_scm_to_skb of af_unix (bsc#1193731).\n- CVE-2021-39657: Fixed an information leak in the Universal Flash Storage subsystem (bsc#1193864).\n\nThe following non-security bugs were fixed:\n\n- ALSA: intel_hdmi: Fix reference to PCM buffer address (git-fixes).\n- ARM: 9182/1: mmu: fix returns from early_param() and __setup() functions (git-fixes).\n- ARM: Fix kgdb breakpoint for Thumb2 (git-fixes).\n- ASoC: cs4265: Fix the duplicated control name (git-fixes).\n- ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min (git-fixes).\n- ASoC: rt5668: do not block workqueue if card is unbound (git-fixes).\n- ASoC: rt5682: do not block workqueue if card is unbound (git-fixes).\n- Bluetooth: btusb: Add missing Chicony device for Realtek RTL8723BE (bsc#1196779).\n- EDAC/altera: Fix deferred probing (bsc#1178134).\n- HID: add mapping for KEY_ALL_APPLICATIONS (git-fixes).\n- HID: add mapping for KEY_DICTATE (git-fixes).\n- Hand over the maintainership to SLE15-SP3 maintainers\n- IB/hfi1: Correct guard on eager buffer deallocation (git-fixes).\n- IB/hfi1: Fix early init panic (git-fixes).\n- IB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr (git-fixes).\n- IB/hfi1: Insure use of smp_processor_id() is preempt disabled (git-fixes).\n- IB/rdmavt: Validate remote_addr during loopback atomic tests (git-fixes).\n- Input: clear BTN_RIGHT/MIDDLE on buttonpads (git-fixes).\n- Input: elan_i2c - fix regulator enable count imbalance after suspend/resume (git-fixes).\n- Input: elan_i2c - move regulator_[en|dis]able() out of elan_[en|dis]able_power() (git-fixes).\n- RDMA/bnxt_re: Scan the whole bitmap when checking if 'disabling RCFW with pending cmd-bit' (git-fixes).\n- RDMA/cma: Do not change route.addr.src_addr outside state checks (bsc#1181147).\n- RDMA/cma: Let cma_resolve_ib_dev() continue search even after empty entry (git-fixes).\n- RDMA/cma: Remove open coding of overflow checking for private_data_len (git-fixes).\n- RDMA/core: Do not infoleak GRH fields (git-fixes).\n- RDMA/core: Let ib_find_gid() continue search even after empty entry (git-fixes).\n- RDMA/cxgb4: Set queue pair state when being queried (git-fixes).\n- RDMA/hns: Validate the pkey index (git-fixes).\n- RDMA/ib_srp: Fix a deadlock (git-fixes).\n- RDMA/mlx4: Do not continue event handler after memory allocation failure (git-fixes).\n- RDMA/rtrs-clt: Fix possible double free in error case (jsc#SLE-15176).\n- RDMA/rxe: Fix a typo in opcode name (git-fixes).\n- RDMA/siw: Fix broken RDMA Read Fence/Resume logic (git-fixes).\n- RDMA/uverbs: Check for null return of kmalloc_array (git-fixes).\n- RDMA/uverbs: Remove the unnecessary assignment (git-fixes).\n- Revert 'USB: serial: ch341: add new Product ID for CH341A' (git-fixes).\n- SUNRPC: avoid race between mod_timer() and del_timer_sync() (bnc#1195403).\n- USB: gadget: validate endpoint index for xilinx udc (git-fixes).\n- USB: gadget: validate interface OS descriptor requests (git-fixes).\n- USB: hub: Clean up use of port initialization schemes and retries (git-fixes).\n- USB: serial: option: add Telit LE910R1 compositions (git-fixes).\n- USB: serial: option: add support for DW5829e (git-fixes).\n- USB: zaurus: support another broken Zaurus (git-fixes).\n- arm64: dts: rockchip: Switch RK3399-Gru DP to SPDIF output (git-fixes).\n- asix: fix uninit-value in asix_mdio_read() (git-fixes).\n- ata: pata_hpt37x: disable primary channel on HPT371 (git-fixes).\n- batman-adv: Do not expect inter-netns unique iflink indices (git-fixes).\n- batman-adv: Request iflink once in batadv-on-batadv check (git-fixes).\n- batman-adv: Request iflink once in batadv_get_real_netdevice (git-fixes).\n- blk-mq: do not free tags if the tag_set is used by other device in queue initialztion (bsc#1193787).\n- bnxt_en: Fix active FEC reporting to ethtool (jsc#SLE-16649).\n- bnxt_en: Fix incorrect multicast rx mask setting when not requested (git-fixes).\n- bnxt_en: Fix occasional ethtool -t loopback test failures (git-fixes).\n- bnxt_en: Fix offline ethtool selftest with RDMA enabled (git-fixes).\n- bonding: force carrier update when releasing slave (git-fixes).\n- can: gs_usb: change active_channels's type from atomic_t to u8 (git-fixes).\n- cgroup-v1: Correct privileges check in release_agent writes (bsc#1196723).\n- cgroup/cpuset: Fix 'suspicious RCU usage' lockdep warning (bsc#1196868).\n- clk: jz4725b: fix mmc0 clock gating (git-fixes).\n- cpufreq: schedutil: Use kobject release() method to free (git-fixes)\n- cpuset: Fix the bug that subpart_cpus updated wrongly in update_cpumask() (bsc#1196866).\n- cputime, cpuacct: Include guest time in user time in (git-fixes)\n- dma-direct: Fix potential NULL pointer dereference (bsc#1196472 ltc#192278).\n- dma-mapping: Allow mixing bypass and mapped DMA operation (bsc#1196472 ltc#192278).\n- dmaengine: shdma: Fix runtime PM imbalance on error (git-fixes).\n- drm/amdgpu: disable MMHUB PG for Picasso (git-fixes).\n- drm/edid: Always set RGB444 (git-fixes).\n- drm/i915/dg1: Wait for pcode/uncore handshake at startup (bsc#1195211).\n- drm/i915/gen11+: Only load DRAM information from pcode (bsc#1195211).\n- drm/i915: Nuke not needed members of dram_info (bsc#1195211).\n- drm/i915: Remove memory frequency calculation (bsc#1195211).\n- drm/i915: Rename is_16gb_dimm to wm_lv_0_adjust_needed (bsc#1195211).\n- efivars: Respect 'block' flag in efivar_entry_set_safe() (git-fixes).\n- exfat: fix i_blocks for files truncated over 4 GiB (git-fixes).\n- exfat: fix incorrect loading of i_blocks for large files (git-fixes).\n- firmware: arm_scmi: Remove space in MODULE_ALIAS name (git-fixes).\n- gpio: rockchip: Reset int_bothedge when changing trigger (git-fixes).\n- gpio: tegra186: Fix chip_data type confusion (git-fixes).\n- gtp: remove useless rcu_read_lock() (git-fixes).\n- hamradio: fix macro redefine warning (git-fixes).\n- i2c: bcm2835: Avoid clock stretching timeouts (git-fixes).\n- iavf: Fix missing check for running netdev (git-fixes).\n- ice: initialize local variable 'tlv' (jsc#SLE-12878).\n- igc: igc_read_phy_reg_gpy: drop premature return (git-fixes).\n- igc: igc_write_phy_reg_gpy: drop premature return (git-fixes).\n- iio: Fix error handling for PM (git-fixes).\n- iio: adc: ad7124: fix mask used for setting AIN_BUFP & AIN_BUFM bits (git-fixes).\n- iio: adc: men_z188_adc: Fix a resource leak in an error handling path (git-fixes).\n- ixgbe: xsk: change !netif_carrier_ok() handling in ixgbe_xmit_zc() (git-fixes).\n- mac80211: fix forwarded mesh frames AC & queue selection (git-fixes).\n- mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work (git-fixes).\n- mac80211_hwsim: report NOACK frames in tx_status (git-fixes).\n- mask out added spinlock in rndis_params (git-fixes).\n- net/mlx5: Fix possible deadlock on rule deletion (git-fixes).\n- net/mlx5: Fix wrong limitation of metadata match on ecpf (git-fixes).\n- net/mlx5: Update the list of the PCI supported devices (git-fixes).\n- net/mlx5: Update the list of the PCI supported devices (git-fixes).\n- net/mlx5e: Fix modify header actions memory leak (git-fixes).\n- net/mlx5e: Fix page DMA map/unmap attributes (bsc#1196468).\n- net/mlx5e: Fix wrong return value on ioctl EEPROM query failure (git-fixes).\n- net/mlx5e: TC, Reject rules with drop and modify hdr action (git-fixes).\n- net/mlx5e: TC, Reject rules with forward and drop actions (git-fixes).\n- net/mlx5e: kTLS, Use CHECKSUM_UNNECESSARY for device-offloaded packets (jsc#SLE-15172).\n- net/sched: act_ct: Fix flow table lookup after ct clear or switching zones (jsc#SLE-15172).\n- net: dsa: mv88e6xxx: MV88E6097 does not support jumbo configuration (git-fixes).\n- net: ethernet: ti: cpsw: disable PTPv1 hw timestamping advertisement (git-fixes).\n- net: fix up skbs delta_truesize in UDP GRO frag_list (bsc#1176447).\n- net: hns3: Clear the CMDQ registers before unmapping BAR region (git-fixes).\n- net: sfc: Replace in_interrupt() usage (git-fixes).\n- net: tipc: validate domain record count on input (bsc#1195254).\n- net: usb: cdc_mbim: avoid altsetting toggling for Telit FN990 (git-fixes).\n- netfilter: nf_tables: fix memory leak during stateful obj update (bsc#1176447).\n- netsec: ignore 'phy-mode' device property on ACPI systems (git-fixes).\n- nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() (git-fixes).\n- nl80211: Handle nla_memdup failures in handle_nan_filter (git-fixes).\n- ntb: intel: fix port config status offset for SPR (git-fixes).\n- nvme-multipath: use vmalloc for ANA log buffer (bsc#1193787).\n- nvme-rdma: fix possible use-after-free in transport error_recovery work (git-fixes).\n- nvme-tcp: fix possible use-after-free in transport error_recovery work (git-fixes).\n- nvme: fix a possible use-after-free in controller reset during load (git-fixes).\n- powerpc/dma: Fallback to dma_ops when persistent memory present (bsc#1196472 ltc#192278). Update config files.\n- powerpc/fadump: register for fadump as early as possible (bsc#1179439 ltc#190038).\n- powerpc/mm: Remove dcache flush from memory remove (bsc#1196433 ltc#196449).\n- powerpc/powernv/memtrace: Fix dcache flushing (bsc#1196433 ltc#196449).\n- powerpc/pseries/iommu: Fix window size for direct mapping with pmem (bsc#1196472 ltc#192278).\n- sched/core: Mitigate race (git-fixes)\n- scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() (git-fixes).\n- scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe (git-fixes).\n- scsi: lpfc: Terminate string in lpfc_debugfs_nvmeio_trc_write() (git-fixes).\n- scsi: nsp_cs: Check of ioremap return value (git-fixes).\n- scsi: qedf: Fix potential dereference of NULL pointer (git-fixes).\n- scsi: smartpqi: Add PCI IDs (bsc#1196627).\n- scsi: ufs: Fix race conditions related to driver data (git-fixes).\n- selftests: mlxsw: tc_police_scale: Make test more robust (bsc#1176774).\n- soc: fsl: Correct MAINTAINERS database (QUICC ENGINE LIBRARY) (git-fixes).\n- soc: fsl: Correct MAINTAINERS database (SOC) (git-fixes).\n- soc: fsl: qe: Check of ioremap return value (git-fixes).\n- spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op() (git-fixes).\n- sr9700: sanity check for packet length (bsc#1196836).\n- tracing: Fix return value of __setup handlers (git-fixes).\n- tty: n_gsm: fix encoding of control signal octet bit DV (git-fixes).\n- tty: n_gsm: fix proper link termination after failed open (git-fixes).\n- usb: dwc2: use well defined macros for power_down (git-fixes).\n- usb: dwc3: gadget: Let the interrupt handler disable bottom halves (git-fixes).\n- usb: dwc3: pci: Fix Bay Trail phy GPIO mappings (git-fixes).\n- usb: gadget: rndis: add spinlock for rndis response list (git-fixes).\n- usb: hub: Fix usb enumeration issue due to address0 race (git-fixes).\n- vrf: Fix fast path output packet handling with async Netfilter rules (git-fixes).\n- xhci: Prevent futile URB re-submissions due to incorrect return value (git-fixes).\n- xhci: re-initialize the HC during resume if HCE was set (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-1037,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-1037", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_1037-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:1037-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20221037-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:1037-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010570.html", }, { category: "self", summary: "SUSE Bug 1176447", url: "https://bugzilla.suse.com/1176447", }, { category: "self", summary: "SUSE Bug 1176774", url: "https://bugzilla.suse.com/1176774", }, { category: "self", summary: "SUSE Bug 1178134", url: "https://bugzilla.suse.com/1178134", }, { category: "self", summary: "SUSE Bug 1179439", url: "https://bugzilla.suse.com/1179439", }, { category: "self", summary: "SUSE Bug 1181147", url: "https://bugzilla.suse.com/1181147", }, { category: "self", summary: "SUSE Bug 1191428", url: "https://bugzilla.suse.com/1191428", }, { category: "self", summary: "SUSE Bug 1192273", url: "https://bugzilla.suse.com/1192273", }, { category: "self", summary: "SUSE Bug 1193731", url: "https://bugzilla.suse.com/1193731", }, { category: "self", summary: "SUSE Bug 1193787", url: "https://bugzilla.suse.com/1193787", }, { category: "self", summary: "SUSE Bug 1193864", url: "https://bugzilla.suse.com/1193864", }, { category: "self", summary: "SUSE Bug 1194463", url: "https://bugzilla.suse.com/1194463", }, { category: "self", summary: "SUSE Bug 1194516", url: "https://bugzilla.suse.com/1194516", }, { category: "self", summary: "SUSE Bug 1195211", url: "https://bugzilla.suse.com/1195211", }, { category: "self", summary: "SUSE Bug 1195254", url: "https://bugzilla.suse.com/1195254", }, { category: "self", summary: "SUSE Bug 1195403", url: "https://bugzilla.suse.com/1195403", }, { category: "self", summary: "SUSE Bug 1195612", url: "https://bugzilla.suse.com/1195612", }, { category: "self", summary: "SUSE Bug 1195897", url: "https://bugzilla.suse.com/1195897", }, { category: "self", summary: "SUSE Bug 1195905", url: "https://bugzilla.suse.com/1195905", }, { category: "self", summary: "SUSE Bug 1195939", url: "https://bugzilla.suse.com/1195939", }, { category: "self", summary: "SUSE Bug 1195949", url: "https://bugzilla.suse.com/1195949", }, { category: "self", summary: "SUSE Bug 1195987", url: "https://bugzilla.suse.com/1195987", }, { category: "self", summary: "SUSE Bug 1196079", url: "https://bugzilla.suse.com/1196079", }, { category: "self", summary: "SUSE Bug 1196095", url: "https://bugzilla.suse.com/1196095", }, { category: "self", summary: "SUSE Bug 1196132", url: "https://bugzilla.suse.com/1196132", }, { category: "self", summary: "SUSE Bug 1196155", url: "https://bugzilla.suse.com/1196155", }, { category: "self", summary: "SUSE Bug 1196299", url: "https://bugzilla.suse.com/1196299", }, { category: "self", summary: "SUSE Bug 1196301", url: "https://bugzilla.suse.com/1196301", }, { category: "self", summary: "SUSE Bug 1196433", url: "https://bugzilla.suse.com/1196433", }, { category: "self", summary: "SUSE Bug 1196468", url: "https://bugzilla.suse.com/1196468", }, { category: "self", summary: "SUSE Bug 1196472", url: "https://bugzilla.suse.com/1196472", }, { category: "self", summary: "SUSE Bug 1196627", url: "https://bugzilla.suse.com/1196627", }, { category: "self", summary: "SUSE Bug 1196723", url: "https://bugzilla.suse.com/1196723", }, { category: "self", summary: "SUSE Bug 1196779", url: "https://bugzilla.suse.com/1196779", }, { category: "self", summary: "SUSE Bug 1196830", url: "https://bugzilla.suse.com/1196830", }, { category: "self", summary: "SUSE Bug 1196836", url: "https://bugzilla.suse.com/1196836", }, { category: "self", summary: "SUSE Bug 1196866", url: "https://bugzilla.suse.com/1196866", }, { category: "self", summary: "SUSE Bug 1196868", url: "https://bugzilla.suse.com/1196868", }, { category: "self", summary: "SUSE CVE CVE-2021-0920 page", url: "https://www.suse.com/security/cve/CVE-2021-0920/", }, { category: "self", summary: "SUSE CVE CVE-2021-39657 page", url: "https://www.suse.com/security/cve/CVE-2021-39657/", }, { category: "self", summary: "SUSE CVE CVE-2021-44879 page", url: "https://www.suse.com/security/cve/CVE-2021-44879/", }, { category: "self", summary: "SUSE CVE CVE-2022-0487 page", url: "https://www.suse.com/security/cve/CVE-2022-0487/", }, { category: "self", summary: "SUSE CVE CVE-2022-0617 page", url: "https://www.suse.com/security/cve/CVE-2022-0617/", }, { category: "self", summary: "SUSE CVE CVE-2022-0644 page", url: "https://www.suse.com/security/cve/CVE-2022-0644/", }, { category: "self", summary: "SUSE CVE CVE-2022-24448 page", url: "https://www.suse.com/security/cve/CVE-2022-24448/", }, { category: "self", summary: "SUSE CVE CVE-2022-24958 page", url: "https://www.suse.com/security/cve/CVE-2022-24958/", }, { category: "self", summary: "SUSE CVE CVE-2022-24959 page", url: "https://www.suse.com/security/cve/CVE-2022-24959/", }, { category: "self", summary: "SUSE CVE CVE-2022-25258 page", url: "https://www.suse.com/security/cve/CVE-2022-25258/", }, { category: "self", summary: "SUSE CVE CVE-2022-25636 page", url: "https://www.suse.com/security/cve/CVE-2022-25636/", }, { category: "self", summary: "SUSE CVE CVE-2022-26490 page", url: "https://www.suse.com/security/cve/CVE-2022-26490/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2022-03-30T07:36:59Z", generator: { date: "2022-03-30T07:36:59Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:1037-1", initial_release_date: "2022-03-30T07:36:59Z", revision_history: [ { date: "2022-03-30T07:36:59Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-azure-5.3.18-150300.38.50.1.noarch", product: { name: "kernel-devel-azure-5.3.18-150300.38.50.1.noarch", product_id: "kernel-devel-azure-5.3.18-150300.38.50.1.noarch", }, }, { category: "product_version", name: "kernel-source-azure-5.3.18-150300.38.50.1.noarch", product: { name: "kernel-source-azure-5.3.18-150300.38.50.1.noarch", product_id: "kernel-source-azure-5.3.18-150300.38.50.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", product: { name: "cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", product_id: "cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", product: { name: "dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", product_id: "dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", product: { name: "gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", product_id: "gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-5.3.18-150300.38.50.1.x86_64", product: { name: "kernel-azure-5.3.18-150300.38.50.1.x86_64", product_id: "kernel-azure-5.3.18-150300.38.50.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", product: { name: "kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", product_id: "kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", product: { name: "kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", product_id: "kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", product: { name: "kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", product_id: "kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", product: { name: "kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", product_id: "kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", product: { name: "kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", product_id: "kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", product: { name: "kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", product_id: "kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", product: { name: "ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", product_id: "ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", product: { name: "reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", product_id: "reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Public Cloud 15 SP3", product: { name: "SUSE Linux Enterprise Module for Public Cloud 15 SP3", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-public-cloud:15:sp3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-azure-5.3.18-150300.38.50.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", }, product_reference: "kernel-azure-5.3.18-150300.38.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.3.18-150300.38.50.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", }, product_reference: "kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-5.3.18-150300.38.50.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", }, product_reference: "kernel-devel-azure-5.3.18-150300.38.50.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-5.3.18-150300.38.50.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", }, product_reference: "kernel-source-azure-5.3.18-150300.38.50.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.3.18-150300.38.50.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", }, product_reference: "kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP3", }, ], }, vulnerabilities: [ { cve: "CVE-2021-0920", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-0920", }, ], notes: [ { category: "general", text: "In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-0920", url: "https://www.suse.com/security/cve/CVE-2021-0920", }, { category: "external", summary: "SUSE Bug 1193731 for CVE-2021-0920", url: "https://bugzilla.suse.com/1193731", }, { category: "external", summary: "SUSE Bug 1194463 for CVE-2021-0920", url: "https://bugzilla.suse.com/1194463", }, { category: "external", summary: "SUSE Bug 1195939 for CVE-2021-0920", url: "https://bugzilla.suse.com/1195939", }, { category: "external", summary: "SUSE Bug 1199255 for CVE-2021-0920", url: "https://bugzilla.suse.com/1199255", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2021-0920", url: "https://bugzilla.suse.com/1200084", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:36:59Z", details: "important", }, ], title: "CVE-2021-0920", }, { cve: "CVE-2021-39657", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39657", }, ], notes: [ { category: "general", text: "In ufshcd_eh_device_reset_handler of ufshcd.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-194696049References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39657", url: "https://www.suse.com/security/cve/CVE-2021-39657", }, { category: "external", summary: "SUSE Bug 1193864 for CVE-2021-39657", url: "https://bugzilla.suse.com/1193864", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:36:59Z", details: "low", }, ], title: "CVE-2021-39657", }, { cve: "CVE-2021-44879", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-44879", }, ], notes: [ { category: "general", text: "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-44879", url: "https://www.suse.com/security/cve/CVE-2021-44879", }, { category: "external", summary: "SUSE Bug 1195987 for CVE-2021-44879", url: "https://bugzilla.suse.com/1195987", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:36:59Z", details: "moderate", }, ], title: "CVE-2021-44879", }, { cve: "CVE-2022-0487", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0487", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0487", url: "https://www.suse.com/security/cve/CVE-2022-0487", }, { category: "external", summary: "SUSE Bug 1194516 for CVE-2022-0487", url: "https://bugzilla.suse.com/1194516", }, { category: "external", summary: "SUSE Bug 1195949 for CVE-2022-0487", url: "https://bugzilla.suse.com/1195949", }, { category: "external", summary: "SUSE Bug 1198615 for CVE-2022-0487", url: "https://bugzilla.suse.com/1198615", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:36:59Z", details: "moderate", }, ], title: "CVE-2022-0487", }, { cve: "CVE-2022-0617", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0617", }, ], notes: [ { category: "general", text: "A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0617", url: "https://www.suse.com/security/cve/CVE-2022-0617", }, { category: "external", summary: "SUSE Bug 1196079 for CVE-2022-0617", url: "https://bugzilla.suse.com/1196079", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:36:59Z", details: "moderate", }, ], title: "CVE-2022-0617", }, { cve: "CVE-2022-0644", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0644", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0644", url: "https://www.suse.com/security/cve/CVE-2022-0644", }, { category: "external", summary: "SUSE Bug 1196155 for CVE-2022-0644", url: "https://bugzilla.suse.com/1196155", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:36:59Z", details: "moderate", }, ], title: "CVE-2022-0644", }, { cve: "CVE-2022-24448", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-24448", }, ], notes: [ { category: "general", text: "An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-24448", url: "https://www.suse.com/security/cve/CVE-2022-24448", }, { category: "external", summary: "SUSE Bug 1195612 for CVE-2022-24448", url: "https://bugzilla.suse.com/1195612", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:36:59Z", details: "moderate", }, ], title: "CVE-2022-24448", }, { cve: "CVE-2022-24958", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-24958", }, ], notes: [ { category: "general", text: "drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev->buf release.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-24958", url: "https://www.suse.com/security/cve/CVE-2022-24958", }, { category: "external", summary: "SUSE Bug 1195905 for CVE-2022-24958", url: "https://bugzilla.suse.com/1195905", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:36:59Z", details: "moderate", }, ], title: "CVE-2022-24958", }, { cve: "CVE-2022-24959", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-24959", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-24959", url: "https://www.suse.com/security/cve/CVE-2022-24959", }, { category: "external", summary: "SUSE Bug 1195897 for CVE-2022-24959", url: "https://bugzilla.suse.com/1195897", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:36:59Z", details: "moderate", }, ], title: "CVE-2022-24959", }, { cve: "CVE-2022-25258", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-25258", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-25258", url: "https://www.suse.com/security/cve/CVE-2022-25258", }, { category: "external", summary: "SUSE Bug 1196095 for CVE-2022-25258", url: "https://bugzilla.suse.com/1196095", }, { category: "external", summary: "SUSE Bug 1196132 for CVE-2022-25258", url: "https://bugzilla.suse.com/1196132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:36:59Z", details: "important", }, ], title: "CVE-2022-25258", }, { cve: "CVE-2022-25636", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-25636", }, ], notes: [ { category: "general", text: "net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows local users to gain privileges because of a heap out-of-bounds write. This is related to nf_tables_offload.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-25636", url: "https://www.suse.com/security/cve/CVE-2022-25636", }, { category: "external", summary: "SUSE Bug 1196299 for CVE-2022-25636", url: "https://bugzilla.suse.com/1196299", }, { category: "external", summary: "SUSE Bug 1196301 for CVE-2022-25636", url: "https://bugzilla.suse.com/1196301", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:36:59Z", details: "important", }, ], title: "CVE-2022-25636", }, { cve: "CVE-2022-26490", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-26490", }, ], notes: [ { category: "general", text: "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-26490", url: "https://www.suse.com/security/cve/CVE-2022-26490", }, { category: "external", summary: "SUSE Bug 1196830 for CVE-2022-26490", url: "https://bugzilla.suse.com/1196830", }, { category: "external", summary: "SUSE Bug 1201656 for CVE-2022-26490", url: "https://bugzilla.suse.com/1201656", }, { category: "external", summary: "SUSE Bug 1201969 for CVE-2022-26490", url: "https://bugzilla.suse.com/1201969", }, { category: "external", summary: "SUSE Bug 1211495 for CVE-2022-26490", url: "https://bugzilla.suse.com/1211495", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:36:59Z", details: "important", }, ], title: "CVE-2022-26490", }, ], }
suse-su-2022:1257-1
Vulnerability from csaf_suse
Published
2022-04-19 09:03
Modified
2022-04-19 09:03
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP2 RT kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2022-0854: Fixed a memory leak flaw was found in the Linux kernels DMA subsystem. This flaw allowed a local user to read random memory from the kernel space (bnc#1196823).
- CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c vulnerability in the Linux kernel (bnc#1198032).
- CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c vulnerability in the Linux kernel (bnc#1198033).
- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel (bnc#1198031).
- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock (bsc#1197331).
- CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow a local attacker to gain privilege escalation (bnc#1197702).
- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation (bnc#1197462).
- CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c which could lead to an use-after-free if there is a corrupted quota file (bnc#1197366).
- CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which allowed attackers to obtain sensitive information from the memory via crafted frame lengths from a USB device (bsc#1196836).
- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed (bsc#1196956).
- CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free bug in unix_gc (bsc#1193731).
- CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers (bsc#1196488).
- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could trigger crash the system or corrupt system memory (bsc#1196830).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image (bsc#1196079).
- CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (bsc#1196235).
- CVE-2022-25258: The USB Gadget subsystem lacked certain validation of interface OS descriptor requests, which could have lead to memory corruption (bsc#1196096).
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
- CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev->buf release (bsc#1195905).
- CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).
- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-28748: Fixed various information leaks that could be caused by malicious USB devices (bsc#1196018).
- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155)
- CVE-2022-0850: Fixed a kernel information leak vulnerability in iov_iter.c (bsc#1196761).
- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution (bsc#1197227).
The following non-security bugs were fixed:
- cifs: use the correct max-length for dentry_path_raw() (bsc#1196196).
- gve: multiple bugfixes (jsc#SLE-23652).
- net/mlx5e: Fix page DMA map/unmap attributes (bsc#1196468).
- netfilter: conntrack: do not refresh sctp entries in closed state (bsc#1197389).
- powerpc/mm/numa: skip NUMA_NO_NODE onlining in parse_numa_properties() (bsc#1179639).
- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).
- scsi: target: iscsi: Fix cmd abort fabric stop race (bsc#1195286).
Patchnames
SUSE-2022-1257,SUSE-SLE-Module-RT-15-SP2-2022-1257,SUSE-SUSE-MicroOS-5.0-2022-1257
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 15 SP2 RT kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-0854: Fixed a memory leak flaw was found in the Linux kernels DMA subsystem. This flaw allowed a local user to read random memory from the kernel space (bnc#1196823).\n- CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c vulnerability in the Linux kernel (bnc#1198032).\n- CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c vulnerability in the Linux kernel (bnc#1198033).\n- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel (bnc#1198031).\n- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock (bsc#1197331).\n- CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow a local attacker to gain privilege escalation (bnc#1197702).\n- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation (bnc#1197462).\n- CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c which could lead to an use-after-free if there is a corrupted quota file (bnc#1197366).\n- CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which allowed attackers to obtain sensitive information from the memory via crafted frame lengths from a USB device (bsc#1196836).\n- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed (bsc#1196956).\n- CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free bug in unix_gc (bsc#1193731).\n- CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers (bsc#1196488).\n- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could trigger crash the system or corrupt system memory (bsc#1196830).\n- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image (bsc#1196079).\n- CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (bsc#1196235).\n- CVE-2022-25258: The USB Gadget subsystem lacked certain validation of interface OS descriptor requests, which could have lead to memory corruption (bsc#1196096).\n- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).\n- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).\n- CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev->buf release (bsc#1195905).\n- CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).\n- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).\n- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).\n- CVE-2022-28748: Fixed various information leaks that could be caused by malicious USB devices (bsc#1196018).\n- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155)\n- CVE-2022-0850: Fixed a kernel information leak vulnerability in iov_iter.c (bsc#1196761).\n- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution (bsc#1197227).\n\n\nThe following non-security bugs were fixed:\n\n- cifs: use the correct max-length for dentry_path_raw() (bsc#1196196).\n- gve: multiple bugfixes (jsc#SLE-23652).\n- net/mlx5e: Fix page DMA map/unmap attributes (bsc#1196468).\n- netfilter: conntrack: do not refresh sctp entries in closed state (bsc#1197389).\n- powerpc/mm/numa: skip NUMA_NO_NODE onlining in parse_numa_properties() (bsc#1179639).\n- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).\n- scsi: target: iscsi: Fix cmd abort fabric stop race (bsc#1195286).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-1257,SUSE-SLE-Module-RT-15-SP2-2022-1257,SUSE-SUSE-MicroOS-5.0-2022-1257", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_1257-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:1257-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20221257-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:1257-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html", }, { category: "self", summary: "SUSE Bug 1179639", url: "https://bugzilla.suse.com/1179639", }, { category: "self", summary: "SUSE Bug 1189126", url: "https://bugzilla.suse.com/1189126", }, { category: "self", summary: "SUSE Bug 1189562", url: "https://bugzilla.suse.com/1189562", }, { category: "self", summary: "SUSE Bug 1193731", url: "https://bugzilla.suse.com/1193731", }, { category: "self", summary: "SUSE Bug 1194516", url: "https://bugzilla.suse.com/1194516", }, { category: "self", summary: "SUSE Bug 1194943", url: "https://bugzilla.suse.com/1194943", }, { category: "self", summary: "SUSE Bug 1195051", url: "https://bugzilla.suse.com/1195051", }, { category: "self", summary: "SUSE Bug 1195254", url: "https://bugzilla.suse.com/1195254", }, { category: "self", summary: "SUSE Bug 1195286", url: "https://bugzilla.suse.com/1195286", }, { category: "self", summary: "SUSE Bug 1195353", url: "https://bugzilla.suse.com/1195353", }, { category: "self", summary: "SUSE Bug 1195403", url: "https://bugzilla.suse.com/1195403", }, { category: "self", summary: "SUSE Bug 1195516", url: "https://bugzilla.suse.com/1195516", }, { category: "self", summary: "SUSE Bug 1195543", url: "https://bugzilla.suse.com/1195543", }, { category: "self", summary: "SUSE Bug 1195612", url: "https://bugzilla.suse.com/1195612", }, { category: "self", summary: "SUSE Bug 1195897", url: "https://bugzilla.suse.com/1195897", }, { category: "self", summary: "SUSE Bug 1195905", url: "https://bugzilla.suse.com/1195905", }, { category: "self", summary: "SUSE Bug 1195939", url: "https://bugzilla.suse.com/1195939", }, { category: "self", summary: "SUSE Bug 1195987", url: "https://bugzilla.suse.com/1195987", }, { category: "self", summary: "SUSE Bug 1196018", url: "https://bugzilla.suse.com/1196018", }, { category: "self", summary: "SUSE Bug 1196079", url: "https://bugzilla.suse.com/1196079", }, { category: "self", summary: "SUSE Bug 1196095", url: "https://bugzilla.suse.com/1196095", }, { category: "self", summary: "SUSE Bug 1196155", url: "https://bugzilla.suse.com/1196155", }, { category: "self", summary: "SUSE Bug 1196196", url: "https://bugzilla.suse.com/1196196", }, { category: "self", summary: "SUSE Bug 1196235", url: "https://bugzilla.suse.com/1196235", }, { category: "self", summary: "SUSE Bug 1196468", url: "https://bugzilla.suse.com/1196468", }, { category: "self", summary: "SUSE Bug 1196488", url: "https://bugzilla.suse.com/1196488", }, { category: "self", summary: "SUSE Bug 1196612", url: "https://bugzilla.suse.com/1196612", }, { category: "self", summary: "SUSE Bug 1196761", url: "https://bugzilla.suse.com/1196761", }, { category: "self", summary: "SUSE Bug 1196776", url: "https://bugzilla.suse.com/1196776", }, { category: "self", summary: "SUSE Bug 1196823", url: "https://bugzilla.suse.com/1196823", }, { category: "self", summary: "SUSE Bug 1196830", url: "https://bugzilla.suse.com/1196830", }, { category: "self", summary: "SUSE Bug 1196836", url: "https://bugzilla.suse.com/1196836", }, { category: "self", summary: "SUSE Bug 1196956", url: "https://bugzilla.suse.com/1196956", }, { category: "self", summary: "SUSE Bug 1197227", url: "https://bugzilla.suse.com/1197227", }, { category: "self", summary: "SUSE Bug 1197331", url: "https://bugzilla.suse.com/1197331", }, { category: "self", summary: "SUSE Bug 1197366", url: "https://bugzilla.suse.com/1197366", }, { category: "self", summary: "SUSE Bug 1197389", url: "https://bugzilla.suse.com/1197389", }, { category: "self", summary: "SUSE Bug 1197462", url: "https://bugzilla.suse.com/1197462", }, { category: "self", summary: "SUSE Bug 1197702", url: "https://bugzilla.suse.com/1197702", }, { category: "self", summary: "SUSE Bug 1198031", url: "https://bugzilla.suse.com/1198031", }, { category: "self", summary: "SUSE Bug 1198032", url: "https://bugzilla.suse.com/1198032", }, { category: "self", summary: "SUSE Bug 1198033", url: "https://bugzilla.suse.com/1198033", }, { category: "self", summary: "SUSE CVE CVE-2021-0920 page", url: "https://www.suse.com/security/cve/CVE-2021-0920/", }, { category: "self", summary: "SUSE CVE CVE-2021-39698 page", url: "https://www.suse.com/security/cve/CVE-2021-39698/", }, { category: "self", summary: "SUSE CVE CVE-2021-44879 page", url: "https://www.suse.com/security/cve/CVE-2021-44879/", }, { category: "self", summary: "SUSE CVE CVE-2021-45868 page", url: "https://www.suse.com/security/cve/CVE-2021-45868/", }, { category: "self", summary: "SUSE CVE CVE-2022-0487 page", url: "https://www.suse.com/security/cve/CVE-2022-0487/", }, { category: "self", summary: "SUSE CVE CVE-2022-0492 page", url: "https://www.suse.com/security/cve/CVE-2022-0492/", }, { category: "self", summary: "SUSE CVE CVE-2022-0516 page", url: "https://www.suse.com/security/cve/CVE-2022-0516/", }, { category: "self", summary: "SUSE CVE CVE-2022-0617 page", url: "https://www.suse.com/security/cve/CVE-2022-0617/", }, { category: "self", summary: "SUSE CVE CVE-2022-0644 page", url: "https://www.suse.com/security/cve/CVE-2022-0644/", }, { category: "self", summary: "SUSE CVE CVE-2022-0850 page", url: "https://www.suse.com/security/cve/CVE-2022-0850/", }, { category: "self", summary: "SUSE CVE CVE-2022-0854 page", url: "https://www.suse.com/security/cve/CVE-2022-0854/", }, { category: "self", summary: "SUSE CVE CVE-2022-1016 page", url: "https://www.suse.com/security/cve/CVE-2022-1016/", }, { category: "self", summary: "SUSE CVE CVE-2022-1048 page", url: "https://www.suse.com/security/cve/CVE-2022-1048/", }, { category: "self", summary: "SUSE CVE CVE-2022-1055 page", url: "https://www.suse.com/security/cve/CVE-2022-1055/", }, { category: "self", summary: "SUSE CVE CVE-2022-23036 page", url: "https://www.suse.com/security/cve/CVE-2022-23036/", }, { category: "self", summary: "SUSE CVE CVE-2022-23037 page", url: "https://www.suse.com/security/cve/CVE-2022-23037/", }, { category: "self", summary: "SUSE CVE CVE-2022-23038 page", url: "https://www.suse.com/security/cve/CVE-2022-23038/", }, { category: "self", summary: "SUSE CVE CVE-2022-23039 page", url: "https://www.suse.com/security/cve/CVE-2022-23039/", }, { category: "self", summary: "SUSE CVE CVE-2022-23040 page", url: "https://www.suse.com/security/cve/CVE-2022-23040/", }, { category: "self", summary: "SUSE CVE CVE-2022-23041 page", url: "https://www.suse.com/security/cve/CVE-2022-23041/", }, { category: "self", summary: "SUSE CVE CVE-2022-23042 page", url: "https://www.suse.com/security/cve/CVE-2022-23042/", }, { category: "self", summary: "SUSE CVE CVE-2022-24448 page", url: "https://www.suse.com/security/cve/CVE-2022-24448/", }, { category: "self", summary: "SUSE CVE CVE-2022-24958 page", url: "https://www.suse.com/security/cve/CVE-2022-24958/", }, { category: "self", summary: "SUSE CVE CVE-2022-24959 page", url: "https://www.suse.com/security/cve/CVE-2022-24959/", }, { category: "self", summary: "SUSE CVE CVE-2022-25258 page", url: "https://www.suse.com/security/cve/CVE-2022-25258/", }, { category: "self", summary: "SUSE CVE CVE-2022-25375 page", url: "https://www.suse.com/security/cve/CVE-2022-25375/", }, { category: "self", summary: "SUSE CVE CVE-2022-26490 page", url: "https://www.suse.com/security/cve/CVE-2022-26490/", }, { category: "self", summary: "SUSE CVE CVE-2022-26966 page", url: "https://www.suse.com/security/cve/CVE-2022-26966/", }, { category: "self", summary: "SUSE CVE CVE-2022-27666 page", url: "https://www.suse.com/security/cve/CVE-2022-27666/", }, { category: "self", summary: "SUSE CVE CVE-2022-28388 page", url: "https://www.suse.com/security/cve/CVE-2022-28388/", }, { category: "self", summary: "SUSE CVE CVE-2022-28389 page", url: "https://www.suse.com/security/cve/CVE-2022-28389/", }, { category: "self", summary: "SUSE CVE CVE-2022-28390 page", url: "https://www.suse.com/security/cve/CVE-2022-28390/", }, { category: "self", summary: "SUSE CVE CVE-2022-28748 page", url: "https://www.suse.com/security/cve/CVE-2022-28748/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2022-04-19T09:03:30Z", generator: { date: "2022-04-19T09:03:30Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:1257-1", initial_release_date: "2022-04-19T09:03:30Z", revision_history: [ { date: "2022-04-19T09:03:30Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-rt-5.3.18-150200.79.2.noarch", product: { name: "kernel-devel-rt-5.3.18-150200.79.2.noarch", product_id: "kernel-devel-rt-5.3.18-150200.79.2.noarch", }, }, { category: "product_version", name: "kernel-source-rt-5.3.18-150200.79.2.noarch", product: { name: "kernel-source-rt-5.3.18-150200.79.2.noarch", product_id: "kernel-source-rt-5.3.18-150200.79.2.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", product: { name: "cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", product_id: "cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-rt_debug-5.3.18-150200.79.2.x86_64", product: { name: "cluster-md-kmp-rt_debug-5.3.18-150200.79.2.x86_64", product_id: "cluster-md-kmp-rt_debug-5.3.18-150200.79.2.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt-5.3.18-150200.79.2.x86_64", product: { name: "dlm-kmp-rt-5.3.18-150200.79.2.x86_64", product_id: "dlm-kmp-rt-5.3.18-150200.79.2.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt_debug-5.3.18-150200.79.2.x86_64", product: { name: "dlm-kmp-rt_debug-5.3.18-150200.79.2.x86_64", product_id: "dlm-kmp-rt_debug-5.3.18-150200.79.2.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", product: { name: "gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", product_id: "gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt_debug-5.3.18-150200.79.2.x86_64", product: { name: "gfs2-kmp-rt_debug-5.3.18-150200.79.2.x86_64", product_id: "gfs2-kmp-rt_debug-5.3.18-150200.79.2.x86_64", }, }, { category: "product_version", name: "kernel-rt-5.3.18-150200.79.2.x86_64", product: { name: "kernel-rt-5.3.18-150200.79.2.x86_64", product_id: "kernel-rt-5.3.18-150200.79.2.x86_64", }, }, { category: "product_version", name: "kernel-rt-devel-5.3.18-150200.79.2.x86_64", product: { name: "kernel-rt-devel-5.3.18-150200.79.2.x86_64", product_id: "kernel-rt-devel-5.3.18-150200.79.2.x86_64", }, }, { category: "product_version", name: "kernel-rt-extra-5.3.18-150200.79.2.x86_64", product: { name: "kernel-rt-extra-5.3.18-150200.79.2.x86_64", product_id: "kernel-rt-extra-5.3.18-150200.79.2.x86_64", }, }, { category: "product_version", name: "kernel-rt-livepatch-devel-5.3.18-150200.79.2.x86_64", product: { name: "kernel-rt-livepatch-devel-5.3.18-150200.79.2.x86_64", product_id: "kernel-rt-livepatch-devel-5.3.18-150200.79.2.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-5.3.18-150200.79.2.x86_64", product: { name: "kernel-rt_debug-5.3.18-150200.79.2.x86_64", product_id: "kernel-rt_debug-5.3.18-150200.79.2.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", product: { name: "kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", product_id: "kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-extra-5.3.18-150200.79.2.x86_64", product: { name: "kernel-rt_debug-extra-5.3.18-150200.79.2.x86_64", product_id: "kernel-rt_debug-extra-5.3.18-150200.79.2.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-livepatch-devel-5.3.18-150200.79.2.x86_64", product: { name: "kernel-rt_debug-livepatch-devel-5.3.18-150200.79.2.x86_64", product_id: "kernel-rt_debug-livepatch-devel-5.3.18-150200.79.2.x86_64", }, }, { category: "product_version", name: "kernel-syms-rt-5.3.18-150200.79.1.x86_64", product: { name: "kernel-syms-rt-5.3.18-150200.79.1.x86_64", product_id: "kernel-syms-rt-5.3.18-150200.79.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt-5.3.18-150200.79.2.x86_64", product: { name: "kselftests-kmp-rt-5.3.18-150200.79.2.x86_64", product_id: "kselftests-kmp-rt-5.3.18-150200.79.2.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt_debug-5.3.18-150200.79.2.x86_64", product: { name: "kselftests-kmp-rt_debug-5.3.18-150200.79.2.x86_64", product_id: "kselftests-kmp-rt_debug-5.3.18-150200.79.2.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", product: { name: "ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", product_id: "ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt_debug-5.3.18-150200.79.2.x86_64", product: { name: "ocfs2-kmp-rt_debug-5.3.18-150200.79.2.x86_64", product_id: "ocfs2-kmp-rt_debug-5.3.18-150200.79.2.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-rt-5.3.18-150200.79.2.x86_64", product: { name: "reiserfs-kmp-rt-5.3.18-150200.79.2.x86_64", product_id: "reiserfs-kmp-rt-5.3.18-150200.79.2.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-rt_debug-5.3.18-150200.79.2.x86_64", product: { name: "reiserfs-kmp-rt_debug-5.3.18-150200.79.2.x86_64", product_id: "reiserfs-kmp-rt_debug-5.3.18-150200.79.2.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Real Time Module 15 SP2", product: { name: "SUSE Real Time Module 15 SP2", product_id: "SUSE Real Time Module 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-rt:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Micro 5.0", product: { name: "SUSE Linux Enterprise Micro 5.0", product_id: "SUSE Linux Enterprise Micro 5.0", product_identification_helper: { cpe: "cpe:/o:suse:suse-microos:5.0", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64 as component of SUSE Real Time Module 15 SP2", product_id: "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", }, product_reference: "cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-rt-5.3.18-150200.79.2.x86_64 as component of SUSE Real Time Module 15 SP2", product_id: "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", }, product_reference: "dlm-kmp-rt-5.3.18-150200.79.2.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-rt-5.3.18-150200.79.2.x86_64 as component of SUSE Real Time Module 15 SP2", product_id: "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", }, product_reference: "gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-rt-5.3.18-150200.79.2.noarch as component of SUSE Real Time Module 15 SP2", product_id: "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", }, product_reference: "kernel-devel-rt-5.3.18-150200.79.2.noarch", relates_to_product_reference: "SUSE Real Time Module 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.3.18-150200.79.2.x86_64 as component of SUSE Real Time Module 15 SP2", product_id: "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", }, product_reference: "kernel-rt-5.3.18-150200.79.2.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-5.3.18-150200.79.2.x86_64 as component of SUSE Real Time Module 15 SP2", product_id: "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", }, product_reference: "kernel-rt-devel-5.3.18-150200.79.2.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-5.3.18-150200.79.2.x86_64 as component of SUSE Real Time Module 15 SP2", product_id: "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", }, product_reference: "kernel-rt_debug-5.3.18-150200.79.2.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64 as component of SUSE Real Time Module 15 SP2", product_id: "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", }, product_reference: "kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-5.3.18-150200.79.2.noarch as component of SUSE Real Time Module 15 SP2", product_id: "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", }, product_reference: "kernel-source-rt-5.3.18-150200.79.2.noarch", relates_to_product_reference: "SUSE Real Time Module 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-rt-5.3.18-150200.79.1.x86_64 as component of SUSE Real Time Module 15 SP2", product_id: "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", }, product_reference: "kernel-syms-rt-5.3.18-150200.79.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64 as component of SUSE Real Time Module 15 SP2", product_id: "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", }, product_reference: "ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.3.18-150200.79.2.x86_64 as component of SUSE Linux Enterprise Micro 5.0", product_id: "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", }, product_reference: "kernel-rt-5.3.18-150200.79.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.0", }, ], }, vulnerabilities: [ { cve: "CVE-2021-0920", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-0920", }, ], notes: [ { category: "general", text: "In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-0920", url: "https://www.suse.com/security/cve/CVE-2021-0920", }, { category: "external", summary: "SUSE Bug 1193731 for CVE-2021-0920", url: "https://bugzilla.suse.com/1193731", }, { category: "external", summary: "SUSE Bug 1194463 for CVE-2021-0920", url: "https://bugzilla.suse.com/1194463", }, { category: "external", summary: "SUSE Bug 1195939 for CVE-2021-0920", url: "https://bugzilla.suse.com/1195939", }, { category: "external", summary: "SUSE Bug 1199255 for CVE-2021-0920", url: "https://bugzilla.suse.com/1199255", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2021-0920", url: "https://bugzilla.suse.com/1200084", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T09:03:30Z", details: "important", }, ], title: "CVE-2021-0920", }, { cve: "CVE-2021-39698", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39698", }, ], notes: [ { category: "general", text: "In aio_poll_complete_work of aio.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-185125206References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39698", url: "https://www.suse.com/security/cve/CVE-2021-39698", }, { category: "external", summary: "SUSE Bug 1196956 for CVE-2021-39698", url: "https://bugzilla.suse.com/1196956", }, { category: "external", summary: "SUSE Bug 1196959 for CVE-2021-39698", url: "https://bugzilla.suse.com/1196959", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2021-39698", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T09:03:30Z", details: "important", }, ], title: "CVE-2021-39698", }, { cve: "CVE-2021-44879", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-44879", }, ], notes: [ { category: "general", text: "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-44879", url: "https://www.suse.com/security/cve/CVE-2021-44879", }, { category: "external", summary: "SUSE Bug 1195987 for CVE-2021-44879", url: "https://bugzilla.suse.com/1195987", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T09:03:30Z", details: "moderate", }, ], title: "CVE-2021-44879", }, { cve: "CVE-2021-45868", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-45868", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.15.3, fs/quota/quota_tree.c does not validate the block number in the quota tree (on disk). This can, for example, lead to a kernel/locking/rwsem.c use-after-free if there is a corrupted quota file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-45868", url: "https://www.suse.com/security/cve/CVE-2021-45868", }, { category: "external", summary: "SUSE Bug 1197366 for CVE-2021-45868", url: "https://bugzilla.suse.com/1197366", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T09:03:30Z", details: "moderate", }, ], title: "CVE-2021-45868", }, { cve: "CVE-2022-0487", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0487", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0487", url: "https://www.suse.com/security/cve/CVE-2022-0487", }, { category: "external", summary: "SUSE Bug 1194516 for CVE-2022-0487", url: "https://bugzilla.suse.com/1194516", }, { category: "external", summary: "SUSE Bug 1195949 for CVE-2022-0487", url: "https://bugzilla.suse.com/1195949", }, { category: "external", summary: "SUSE Bug 1198615 for CVE-2022-0487", url: "https://bugzilla.suse.com/1198615", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T09:03:30Z", details: "moderate", }, ], title: "CVE-2022-0487", }, { cve: "CVE-2022-0492", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0492", }, ], notes: [ { category: "general", text: "A vulnerability was found in the Linux kernel's cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0492", url: "https://www.suse.com/security/cve/CVE-2022-0492", }, { category: "external", summary: "SUSE Bug 1195543 for CVE-2022-0492", url: "https://bugzilla.suse.com/1195543", }, { category: "external", summary: "SUSE Bug 1195908 for CVE-2022-0492", url: "https://bugzilla.suse.com/1195908", }, { category: "external", summary: "SUSE Bug 1196612 for CVE-2022-0492", url: "https://bugzilla.suse.com/1196612", }, { category: "external", summary: "SUSE Bug 1196776 for CVE-2022-0492", url: "https://bugzilla.suse.com/1196776", }, { category: "external", summary: "SUSE Bug 1198615 for CVE-2022-0492", url: "https://bugzilla.suse.com/1198615", }, { category: "external", summary: "SUSE Bug 1199255 for CVE-2022-0492", url: "https://bugzilla.suse.com/1199255", }, { category: "external", summary: "SUSE Bug 1199615 for CVE-2022-0492", url: "https://bugzilla.suse.com/1199615", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2022-0492", url: "https://bugzilla.suse.com/1200084", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T09:03:30Z", details: "moderate", }, ], title: "CVE-2022-0492", }, { cve: "CVE-2022-0516", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0516", }, ], notes: [ { category: "general", text: "A vulnerability was found in kvm_s390_guest_sida_op in the arch/s390/kvm/kvm-s390.c function in KVM for s390 in the Linux kernel. This flaw allows a local attacker with a normal user privilege to obtain unauthorized memory write access. This flaw affects Linux kernel versions prior to 5.17-rc4.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0516", url: "https://www.suse.com/security/cve/CVE-2022-0516", }, { category: "external", summary: "SUSE Bug 1195516 for CVE-2022-0516", url: "https://bugzilla.suse.com/1195516", }, { category: "external", summary: "SUSE Bug 1195947 for CVE-2022-0516", url: "https://bugzilla.suse.com/1195947", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T09:03:30Z", details: "important", }, ], title: "CVE-2022-0516", }, { cve: "CVE-2022-0617", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0617", }, ], notes: [ { category: "general", text: "A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0617", url: "https://www.suse.com/security/cve/CVE-2022-0617", }, { category: "external", summary: "SUSE Bug 1196079 for CVE-2022-0617", url: "https://bugzilla.suse.com/1196079", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T09:03:30Z", details: "moderate", }, ], title: "CVE-2022-0617", }, { cve: "CVE-2022-0644", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0644", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0644", url: "https://www.suse.com/security/cve/CVE-2022-0644", }, { category: "external", summary: "SUSE Bug 1196155 for CVE-2022-0644", url: "https://bugzilla.suse.com/1196155", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T09:03:30Z", details: "moderate", }, ], title: "CVE-2022-0644", }, { cve: "CVE-2022-0850", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0850", }, ], notes: [ { category: "general", text: "A vulnerability was found in linux kernel, where an information leak occurs via ext4_extent_header to userspace.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0850", url: "https://www.suse.com/security/cve/CVE-2022-0850", }, { category: "external", summary: "SUSE Bug 1196761 for CVE-2022-0850", url: "https://bugzilla.suse.com/1196761", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T09:03:30Z", details: "moderate", }, ], title: "CVE-2022-0850", }, { cve: "CVE-2022-0854", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0854", }, ], notes: [ { category: "general", text: "A memory leak flaw was found in the Linux kernel's DMA subsystem, in the way a user calls DMA_FROM_DEVICE. This flaw allows a local user to read random memory from the kernel space.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0854", url: "https://www.suse.com/security/cve/CVE-2022-0854", }, { category: "external", summary: "SUSE Bug 1196823 for CVE-2022-0854", url: "https://bugzilla.suse.com/1196823", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T09:03:30Z", details: "moderate", }, ], title: "CVE-2022-0854", }, { cve: "CVE-2022-1016", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1016", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle 'return' with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1016", url: "https://www.suse.com/security/cve/CVE-2022-1016", }, { category: "external", summary: "SUSE Bug 1197335 for CVE-2022-1016", url: "https://bugzilla.suse.com/1197335", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T09:03:30Z", details: "important", }, ], title: "CVE-2022-1016", }, { cve: "CVE-2022-1048", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1048", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in the Linux kernel's sound subsystem in the way a user triggers concurrent calls of PCM hw_params. The hw_free ioctls or similar race condition happens inside ALSA PCM for other ioctls. This flaw allows a local user to crash or potentially escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1048", url: "https://www.suse.com/security/cve/CVE-2022-1048", }, { category: "external", summary: "SUSE Bug 1197331 for CVE-2022-1048", url: "https://bugzilla.suse.com/1197331", }, { category: "external", summary: "SUSE Bug 1197597 for CVE-2022-1048", url: "https://bugzilla.suse.com/1197597", }, { category: "external", summary: "SUSE Bug 1200041 for CVE-2022-1048", url: "https://bugzilla.suse.com/1200041", }, { category: "external", summary: "SUSE Bug 1204132 for CVE-2022-1048", url: "https://bugzilla.suse.com/1204132", }, { category: "external", summary: "SUSE Bug 1212325 for CVE-2022-1048", url: "https://bugzilla.suse.com/1212325", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T09:03:30Z", details: "important", }, ], title: "CVE-2022-1048", }, { cve: "CVE-2022-1055", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1055", }, ], notes: [ { category: "general", text: "A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1055", url: "https://www.suse.com/security/cve/CVE-2022-1055", }, { category: "external", summary: "SUSE Bug 1197702 for CVE-2022-1055", url: "https://bugzilla.suse.com/1197702", }, { category: "external", summary: "SUSE Bug 1197705 for CVE-2022-1055", url: "https://bugzilla.suse.com/1197705", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T09:03:30Z", details: "important", }, ], title: "CVE-2022-1055", }, { cve: "CVE-2022-23036", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-23036", }, ], notes: [ { category: "general", text: "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-23036", url: "https://www.suse.com/security/cve/CVE-2022-23036", }, { category: "external", summary: "SUSE Bug 1196488 for CVE-2022-23036", url: "https://bugzilla.suse.com/1196488", }, { category: "external", summary: "SUSE Bug 1199099 for CVE-2022-23036", url: "https://bugzilla.suse.com/1199099", }, { category: "external", summary: "SUSE Bug 1199141 for CVE-2022-23036", url: "https://bugzilla.suse.com/1199141", }, { category: "external", summary: "SUSE Bug 1204132 for CVE-2022-23036", url: "https://bugzilla.suse.com/1204132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T09:03:30Z", details: "important", }, ], title: "CVE-2022-23036", }, { cve: "CVE-2022-23037", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-23037", }, ], notes: [ { category: "general", text: "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-23037", url: "https://www.suse.com/security/cve/CVE-2022-23037", }, { category: "external", summary: "SUSE Bug 1199099 for CVE-2022-23037", url: "https://bugzilla.suse.com/1199099", }, { category: "external", summary: "SUSE Bug 1199141 for CVE-2022-23037", url: "https://bugzilla.suse.com/1199141", }, { category: "external", summary: "SUSE Bug 1204132 for CVE-2022-23037", url: "https://bugzilla.suse.com/1204132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T09:03:30Z", details: "important", }, ], title: "CVE-2022-23037", }, { cve: "CVE-2022-23038", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-23038", }, ], notes: [ { category: "general", text: "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-23038", url: "https://www.suse.com/security/cve/CVE-2022-23038", }, { category: "external", summary: "SUSE Bug 1199099 for CVE-2022-23038", url: "https://bugzilla.suse.com/1199099", }, { category: "external", summary: "SUSE Bug 1199141 for CVE-2022-23038", url: "https://bugzilla.suse.com/1199141", }, { category: "external", summary: "SUSE Bug 1204132 for CVE-2022-23038", url: "https://bugzilla.suse.com/1204132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T09:03:30Z", details: "important", }, ], title: "CVE-2022-23038", }, { cve: "CVE-2022-23039", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-23039", }, ], notes: [ { category: "general", text: "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-23039", url: "https://www.suse.com/security/cve/CVE-2022-23039", }, { category: "external", summary: "SUSE Bug 1199099 for CVE-2022-23039", url: "https://bugzilla.suse.com/1199099", }, { category: "external", summary: "SUSE Bug 1199141 for CVE-2022-23039", url: "https://bugzilla.suse.com/1199141", }, { category: "external", summary: "SUSE Bug 1204132 for CVE-2022-23039", url: "https://bugzilla.suse.com/1204132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T09:03:30Z", details: "important", }, ], title: "CVE-2022-23039", }, { cve: "CVE-2022-23040", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-23040", }, ], notes: [ { category: "general", text: "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-23040", url: "https://www.suse.com/security/cve/CVE-2022-23040", }, { category: "external", summary: "SUSE Bug 1199099 for CVE-2022-23040", url: "https://bugzilla.suse.com/1199099", }, { category: "external", summary: "SUSE Bug 1199141 for CVE-2022-23040", url: "https://bugzilla.suse.com/1199141", }, { category: "external", summary: "SUSE Bug 1204132 for CVE-2022-23040", url: "https://bugzilla.suse.com/1204132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T09:03:30Z", details: "important", }, ], title: "CVE-2022-23040", }, { cve: "CVE-2022-23041", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-23041", }, ], notes: [ { category: "general", text: "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-23041", url: "https://www.suse.com/security/cve/CVE-2022-23041", }, { category: "external", summary: "SUSE Bug 1199099 for CVE-2022-23041", url: "https://bugzilla.suse.com/1199099", }, { category: "external", summary: "SUSE Bug 1199141 for CVE-2022-23041", url: "https://bugzilla.suse.com/1199141", }, { category: "external", summary: "SUSE Bug 1204132 for CVE-2022-23041", url: "https://bugzilla.suse.com/1204132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T09:03:30Z", details: "important", }, ], title: "CVE-2022-23041", }, { cve: "CVE-2022-23042", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-23042", }, ], notes: [ { category: "general", text: "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-23042", url: "https://www.suse.com/security/cve/CVE-2022-23042", }, { category: "external", summary: "SUSE Bug 1199099 for CVE-2022-23042", url: "https://bugzilla.suse.com/1199099", }, { category: "external", summary: "SUSE Bug 1199141 for CVE-2022-23042", url: "https://bugzilla.suse.com/1199141", }, { category: "external", summary: "SUSE Bug 1204132 for CVE-2022-23042", url: "https://bugzilla.suse.com/1204132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T09:03:30Z", details: "important", }, ], title: "CVE-2022-23042", }, { cve: "CVE-2022-24448", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-24448", }, ], notes: [ { category: "general", text: "An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-24448", url: "https://www.suse.com/security/cve/CVE-2022-24448", }, { category: "external", summary: "SUSE Bug 1195612 for CVE-2022-24448", url: "https://bugzilla.suse.com/1195612", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T09:03:30Z", details: "moderate", }, ], title: "CVE-2022-24448", }, { cve: "CVE-2022-24958", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-24958", }, ], notes: [ { category: "general", text: "drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev->buf release.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-24958", url: "https://www.suse.com/security/cve/CVE-2022-24958", }, { category: "external", summary: "SUSE Bug 1195905 for CVE-2022-24958", url: "https://bugzilla.suse.com/1195905", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T09:03:30Z", details: "moderate", }, ], title: "CVE-2022-24958", }, { cve: "CVE-2022-24959", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-24959", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-24959", url: "https://www.suse.com/security/cve/CVE-2022-24959", }, { category: "external", summary: "SUSE Bug 1195897 for CVE-2022-24959", url: "https://bugzilla.suse.com/1195897", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T09:03:30Z", details: "moderate", }, ], title: "CVE-2022-24959", }, { cve: "CVE-2022-25258", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-25258", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-25258", url: "https://www.suse.com/security/cve/CVE-2022-25258", }, { category: "external", summary: "SUSE Bug 1196095 for CVE-2022-25258", url: "https://bugzilla.suse.com/1196095", }, { category: "external", summary: "SUSE Bug 1196132 for CVE-2022-25258", url: "https://bugzilla.suse.com/1196132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T09:03:30Z", details: "important", }, ], title: "CVE-2022-25258", }, { cve: "CVE-2022-25375", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-25375", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/usb/gadget/function/rndis.c in the Linux kernel before 5.16.10. The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-25375", url: "https://www.suse.com/security/cve/CVE-2022-25375", }, { category: "external", summary: "SUSE Bug 1196235 for CVE-2022-25375", url: "https://bugzilla.suse.com/1196235", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T09:03:30Z", details: "moderate", }, ], title: "CVE-2022-25375", }, { cve: "CVE-2022-26490", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-26490", }, ], notes: [ { category: "general", text: "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-26490", url: "https://www.suse.com/security/cve/CVE-2022-26490", }, { category: "external", summary: "SUSE Bug 1196830 for CVE-2022-26490", url: "https://bugzilla.suse.com/1196830", }, { category: "external", summary: "SUSE Bug 1201656 for CVE-2022-26490", url: "https://bugzilla.suse.com/1201656", }, { category: "external", summary: "SUSE Bug 1201969 for CVE-2022-26490", url: "https://bugzilla.suse.com/1201969", }, { category: "external", summary: "SUSE Bug 1211495 for CVE-2022-26490", url: "https://bugzilla.suse.com/1211495", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T09:03:30Z", details: "important", }, ], title: "CVE-2022-26490", }, { cve: "CVE-2022-26966", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-26966", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.16.12. drivers/net/usb/sr9700.c allows attackers to obtain sensitive information from heap memory via crafted frame lengths from a device.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-26966", url: "https://www.suse.com/security/cve/CVE-2022-26966", }, { category: "external", summary: "SUSE Bug 1196836 for CVE-2022-26966", url: "https://bugzilla.suse.com/1196836", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T09:03:30Z", details: "moderate", }, ], title: "CVE-2022-26966", }, { cve: "CVE-2022-27666", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-27666", }, ], notes: [ { category: "general", text: "A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-27666", url: "https://www.suse.com/security/cve/CVE-2022-27666", }, { category: "external", summary: "SUSE Bug 1197131 for CVE-2022-27666", url: "https://bugzilla.suse.com/1197131", }, { category: "external", summary: "SUSE Bug 1197133 for CVE-2022-27666", url: "https://bugzilla.suse.com/1197133", }, { category: "external", summary: "SUSE Bug 1197462 for CVE-2022-27666", url: "https://bugzilla.suse.com/1197462", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T09:03:30Z", details: "important", }, ], title: "CVE-2022-27666", }, { cve: "CVE-2022-28388", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-28388", }, ], notes: [ { category: "general", text: "usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-28388", url: "https://www.suse.com/security/cve/CVE-2022-28388", }, { category: "external", summary: "SUSE Bug 1198032 for CVE-2022-28388", url: "https://bugzilla.suse.com/1198032", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T09:03:30Z", details: "moderate", }, ], title: "CVE-2022-28388", }, { cve: "CVE-2022-28389", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-28389", }, ], notes: [ { category: "general", text: "mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-28389", url: "https://www.suse.com/security/cve/CVE-2022-28389", }, { category: "external", summary: "SUSE Bug 1198033 for CVE-2022-28389", url: "https://bugzilla.suse.com/1198033", }, { category: "external", summary: "SUSE Bug 1201657 for CVE-2022-28389", url: "https://bugzilla.suse.com/1201657", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T09:03:30Z", details: "moderate", }, ], title: "CVE-2022-28389", }, { cve: "CVE-2022-28390", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-28390", }, ], notes: [ { category: "general", text: "ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-28390", url: "https://www.suse.com/security/cve/CVE-2022-28390", }, { category: "external", summary: "SUSE Bug 1198031 for CVE-2022-28390", url: "https://bugzilla.suse.com/1198031", }, { category: "external", summary: "SUSE Bug 1201517 for CVE-2022-28390", url: "https://bugzilla.suse.com/1201517", }, { category: "external", summary: "SUSE Bug 1207969 for CVE-2022-28390", url: "https://bugzilla.suse.com/1207969", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T09:03:30Z", details: "moderate", }, ], title: "CVE-2022-28390", }, { cve: "CVE-2022-28748", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-28748", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2964. Reason: This candidate is a reservation duplicate of CVE-2022-2964. Notes: All CVE users should reference CVE-2022-2964 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-28748", url: "https://www.suse.com/security/cve/CVE-2022-28748", }, { category: "external", summary: "SUSE Bug 1196018 for CVE-2022-28748", url: "https://bugzilla.suse.com/1196018", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-150200.79.2.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-150200.79.2.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-150200.79.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-150200.79.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T09:03:30Z", details: "low", }, ], title: "CVE-2022-28748", }, ], }
suse-su-2022:1038-1
Vulnerability from csaf_suse
Published
2022-03-30 07:37
Modified
2022-03-30 07:37
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-25636: Fixed an issue which allowed a local users to gain privileges because of a heap out-of-bounds write in nf_dup_netdev.c, related to nf_tables_offload (bsc#1196299).
- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could trigger crash the system or corrupt system memory (bsc#1196830).
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).
- CVE-2022-24448: Fixed an issue if an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd(). (bsc#1196155)
- CVE-2022-25258: The USB Gadget subsystem lacked certain validation of interface OS descriptor requests, which could have lead to memory corruption (bsc#1196096).
- CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev->buf release (bsc#1195905).
- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
- CVE-2022-27223: In drivers/usb/gadget/udc/udc-xilinx.c the endpoint index was not validated and could have been manipulated by the host for out-of-array access (bsc#1197245).
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free vulnerability in unix_scm_to_skb of af_unix (bsc#1193731).
- CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which allowed attackers to obtain sensitive information from heap memory via crafted frame lengths from a device (bsc#1196836).
- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)
- CVE-2021-45402: The check_alu_op function in kernel/bpf/verifier.c did not properly update bounds while handling the mov32 instruction, which allowed local users to obtain potentially sensitive address information (bsc#1196130).
- CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers. (bsc#1196488)
The following non-security bugs were fixed:
- ALSA: intel_hdmi: Fix reference to PCM buffer address (git-fixes).
- arm64: dts: rockchip: Switch RK3399-Gru DP to SPDIF output (git-fixes).
- ARM: 9182/1: mmu: fix returns from early_param() and __setup() functions (git-fixes).
- ARM: Fix kgdb breakpoint for Thumb2 (git-fixes).
- asix: fix uninit-value in asix_mdio_read() (git-fixes).
- ASoC: cs4265: Fix the duplicated control name (git-fixes).
- ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min (git-fixes).
- ASoC: rt5682: do not block workqueue if card is unbound (git-fixes).
- ata: pata_hpt37x: disable primary channel on HPT371 (git-fixes).
- ax25: Fix NULL pointer dereference in ax25_kill_by_device (git-fixes).
- batman-adv: Do not expect inter-netns unique iflink indices (git-fixes).
- batman-adv: Request iflink once in batadv_get_real_netdevice (git-fixes).
- batman-adv: Request iflink once in batadv-on-batadv check (git-fixes).
- blk-mq: do not free tags if the tag_set is used by other device in queue initialztion (bsc#1193787).
- Bluetooth: btusb: Add missing Chicony device for Realtek RTL8723BE (bsc#1196779).
- bnxt_en: Fix active FEC reporting to ethtool (jsc#SLE-16649).
- bnxt_en: Fix incorrect multicast rx mask setting when not requested (git-fixes).
- bnxt_en: Fix occasional ethtool -t loopback test failures (git-fixes).
- bnxt_en: Fix offline ethtool selftest with RDMA enabled (git-fixes).
- bonding: force carrier update when releasing slave (git-fixes).
- can: gs_usb: change active_channels's type from atomic_t to u8 (git-fixes).
- cgroup/cpuset: Fix 'suspicious RCU usage' lockdep warning (bsc#1196868).
- cgroup-v1: Correct privileges check in release_agent writes (bsc#1196723).
- clk: jz4725b: fix mmc0 clock gating (git-fixes).
- constraints: Also adjust disk requirement for x86 and s390.
- constraints: Increase disk space for aarch64
- cpufreq: schedutil: Use kobject release() method to free (git-fixes)
- cpuset: Fix the bug that subpart_cpus updated wrongly in update_cpumask() (bsc#1196866).
- cputime, cpuacct: Include guest time in user time in (git-fixes)
- dma-direct: Fix potential NULL pointer dereference (bsc#1196472 ltc#192278).
- dmaengine: shdma: Fix runtime PM imbalance on error (git-fixes).
- dma-mapping: Allow mixing bypass and mapped DMA operation (bsc#1196472 ltc#192278).
- drm/amdgpu: disable MMHUB PG for Picasso (git-fixes).
- drm/edid: Always set RGB444 (git-fixes).
- drm/i915/dg1: Wait for pcode/uncore handshake at startup (bsc#1195211).
- drm/i915/gen11+: Only load DRAM information from pcode (bsc#1195211).
- drm/i915: Nuke not needed members of dram_info (bsc#1195211).
- drm/i915: Remove memory frequency calculation (bsc#1195211).
- drm/i915: Rename is_16gb_dimm to wm_lv_0_adjust_needed (bsc#1195211).
- drm/sun4i: mixer: Fix P010 and P210 format numbers (git-fixes).
- EDAC/altera: Fix deferred probing (bsc#1178134).
- EDAC: Fix calculation of returned address and next offset in edac_align_ptr() (bsc#1178134).
- efivars: Respect 'block' flag in efivar_entry_set_safe() (git-fixes).
- exfat: fix i_blocks for files truncated over 4 GiB (git-fixes).
- exfat: fix incorrect loading of i_blocks for large files (git-fixes).
- firmware: arm_scmi: Remove space in MODULE_ALIAS name (git-fixes).
- gianfar: ethtool: Fix refcount leak in gfar_get_ts_info (git-fixes).
- gpiolib: acpi: Convert ACPI value of debounce to microseconds (git-fixes).
- gpio: rockchip: Reset int_bothedge when changing trigger (git-fixes).
- gpio: tegra186: Fix chip_data type confusion (git-fixes).
- gpio: ts4900: Do not set DAT and OE together (git-fixes).
- gtp: remove useless rcu_read_lock() (git-fixes).
- hamradio: fix macro redefine warning (git-fixes).
- Hand over the maintainership to SLE15-SP3 maintainers
- HID: add mapping for KEY_ALL_APPLICATIONS (git-fixes).
- HID: add mapping for KEY_DICTATE (git-fixes).
- i2c: bcm2835: Avoid clock stretching timeouts (git-fixes).
- iavf: Fix missing check for running netdev (git-fixes).
- IB/hfi1: Correct guard on eager buffer deallocation (git-fixes).
- IB/hfi1: Fix early init panic (git-fixes).
- IB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr (git-fixes).
- IB/hfi1: Insure use of smp_processor_id() is preempt disabled (git-fixes).
- IB/rdmavt: Validate remote_addr during loopback atomic tests (git-fixes).
- ice: initialize local variable 'tlv' (jsc#SLE-12878).
- igc: igc_read_phy_reg_gpy: drop premature return (git-fixes).
- igc: igc_write_phy_reg_gpy: drop premature return (git-fixes).
- iio: adc: ad7124: fix mask used for setting AIN_BUFP & AIN_BUFM bits (git-fixes).
- iio: adc: men_z188_adc: Fix a resource leak in an error handling path (git-fixes).
- iio: Fix error handling for PM (git-fixes).
- Input: clear BTN_RIGHT/MIDDLE on buttonpads (git-fixes).
- Input: elan_i2c - fix regulator enable count imbalance after suspend/resume (git-fixes).
- Input: elan_i2c - move regulator_[en|dis]able() out of elan_[en|dis]able_power() (git-fixes).
- ixgbe: xsk: change !netif_carrier_ok() handling in ixgbe_xmit_zc() (git-fixes).
- mac80211: fix forwarded mesh frames AC & queue selection (git-fixes).
- mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work (git-fixes).
- mac80211_hwsim: report NOACK frames in tx_status (git-fixes).
- mask out added spinlock in rndis_params (git-fixes).
- mmc: meson: Fix usage of meson_mmc_post_req() (git-fixes).
- net: dsa: mv88e6xxx: MV88E6097 does not support jumbo configuration (git-fixes).
- net: ethernet: ti: cpsw: disable PTPv1 hw timestamping advertisement (git-fixes).
- netfilter: nf_tables: fix memory leak during stateful obj update (bsc#1176447).
- net: fix up skbs delta_truesize in UDP GRO frag_list (bsc#1176447).
- net: hns3: Clear the CMDQ registers before unmapping BAR region (git-fixes).
- net/mlx5e: Fix modify header actions memory leak (git-fixes).
- net/mlx5e: Fix page DMA map/unmap attributes (bsc#1196468).
- net/mlx5e: Fix wrong return value on ioctl EEPROM query failure (git-fixes).
- net/mlx5e: kTLS, Use CHECKSUM_UNNECESSARY for device-offloaded packets (jsc#SLE-15172).
- net/mlx5e: TC, Reject rules with drop and modify hdr action (git-fixes).
- net/mlx5e: TC, Reject rules with forward and drop actions (git-fixes).
- net/mlx5: Fix possible deadlock on rule deletion (git-fixes).
- net/mlx5: Fix wrong limitation of metadata match on ecpf (git-fixes).
- net/mlx5: Update the list of the PCI supported devices (git-fixes).
- net: phy: DP83822: clear MISR2 register to disable interrupts (git-fixes).
- net/sched: act_ct: Fix flow table lookup after ct clear or switching zones (jsc#SLE-15172).
- netsec: ignore 'phy-mode' device property on ACPI systems (git-fixes).
- net: sfc: Replace in_interrupt() usage (git-fixes).
- net: tipc: validate domain record count on input (bsc#1195254).
- net: usb: cdc_mbim: avoid altsetting toggling for Telit FN990 (git-fixes).
- NFC: port100: fix use-after-free in port100_send_complete (git-fixes).
- nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() (git-fixes).
- nl80211: Handle nla_memdup failures in handle_nan_filter (git-fixes).
- ntb: intel: fix port config status offset for SPR (git-fixes).
- nvme: fix a possible use-after-free in controller reset during load (git-fixes).
- nvme-multipath: use vmalloc for ANA log buffer (bsc#1193787).
- nvme-rdma: fix possible use-after-free in transport error_recovery work (git-fixes).
- nvme-tcp: fix possible use-after-free in transport error_recovery work (git-fixes).
- powerpc/dma: Fallback to dma_ops when persistent memory present (bsc#1196472 ltc#192278).
- powerpc/fadump: register for fadump as early as possible (bsc#1179439 ltc#190038).
- powerpc/mm: Remove dcache flush from memory remove (bsc#1196433 ltc#196449).
- powerpc/powernv/memtrace: Fix dcache flushing (bsc#1196433 ltc#196449).
- powerpc/pseries/iommu: Fix window size for direct mapping with pmem (bsc#1196472 ltc#192278).
- RDMA/bnxt_re: Scan the whole bitmap when checking if 'disabling RCFW with pending cmd-bit' (git-fixes).
- RDMA/cma: Do not change route.addr.src_addr outside state checks (bsc#1181147).
- RDMA/cma: Let cma_resolve_ib_dev() continue search even after empty entry (git-fixes).
- RDMA/cma: Remove open coding of overflow checking for private_data_len (git-fixes).
- RDMA/core: Do not infoleak GRH fields (git-fixes).
- RDMA/core: Let ib_find_gid() continue search even after empty entry (git-fixes).
- RDMA/cxgb4: Set queue pair state when being queried (git-fixes).
- RDMA/hns: Validate the pkey index (git-fixes).
- RDMA/ib_srp: Fix a deadlock (git-fixes).
- RDMA/mlx4: Do not continue event handler after memory allocation failure (git-fixes).
- RDMA/rtrs-clt: Fix possible double free in error case (jsc#SLE-15176).
- RDMA/rxe: Fix a typo in opcode name (git-fixes).
- RDMA/siw: Fix broken RDMA Read Fence/Resume logic (git-fixes).
- RDMA/uverbs: Check for null return of kmalloc_array (git-fixes).
- RDMA/uverbs: Remove the unnecessary assignment (git-fixes).
- README.BRANCH: Add Frederic Weisbecker as branch maintainer
- README.BRANCH: Remove Davidlohr Bueso as a branch maintainer
- rpm/arch-symbols,guards,*driver: Replace Novell with SUSE.
- rpm: SC2006: Use $(...) notation instead of legacy backticked `...`.
- sched/core: Mitigate race (git-fixes)
- scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() (git-fixes).
- scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe (git-fixes).
- scsi: lpfc: Terminate string in lpfc_debugfs_nvmeio_trc_write() (git-fixes).
- scsi: nsp_cs: Check of ioremap return value (git-fixes).
- scsi: qedf: Fix potential dereference of NULL pointer (git-fixes).
- scsi: smartpqi: Add PCI IDs (bsc#1196627).
- scsi: ufs: Fix race conditions related to driver data (git-fixes).
- selftests: mlxsw: tc_police_scale: Make test more robust (bsc#1176774).
- soc: fsl: Correct MAINTAINERS database (QUICC ENGINE LIBRARY) (git-fixes).
- soc: fsl: Correct MAINTAINERS database (SOC) (git-fixes).
- soc: fsl: qe: Check of ioremap return value (git-fixes).
- spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op() (git-fixes).
- sr9700: sanity check for packet length (bsc#1196836).
- staging: gdm724x: fix use after free in gdm_lte_rx() (git-fixes).
- SUNRPC: avoid race between mod_timer() and del_timer_sync() (bnc#1195403).
- tracing: Fix return value of __setup handlers (git-fixes).
- tty: n_gsm: fix encoding of control signal octet bit DV (git-fixes).
- tty: n_gsm: fix proper link termination after failed open (git-fixes).
- usb: dwc2: Fix Stalling a Non-Isochronous OUT EP (git-fixes).
- usb: dwc2: gadget: Fix GOUTNAK flow for Slave mode (git-fixes).
- usb: dwc2: gadget: Fix kill_all_requests race (git-fixes).
- usb: dwc2: use well defined macros for power_down (git-fixes).
- usb: dwc3: gadget: Let the interrupt handler disable bottom halves (git-fixes).
- usb: dwc3: meson-g12a: Disable the regulator in the error handling path of the probe (git-fixes).
- usb: dwc3: pci: Fix Bay Trail phy GPIO mappings (git-fixes).
- usb: gadget: rndis: add spinlock for rndis response list (git-fixes).
- USB: gadget: validate endpoint index for xilinx udc (git-fixes).
- USB: gadget: validate interface OS descriptor requests (git-fixes).
- usb: host: xen-hcd: add missing unlock in error path (git-fixes).
- USB: hub: Clean up use of port initialization schemes and retries (git-fixes).
- usb: hub: Fix locking issues with address0_mutex (git-fixes).
- usb: hub: Fix usb enumeration issue due to address0 race (git-fixes).
- USB: serial: option: add support for DW5829e (git-fixes).
- USB: serial: option: add Telit LE910R1 compositions (git-fixes).
- USB: zaurus: support another broken Zaurus (git-fixes).
- vrf: Fix fast path output packet handling with async Netfilter rules (git-fixes).
- xen/usb: do not use gnttab_end_foreign_access() in xenhcd_gnttab_done() (bsc#1196488, XSA-396).
- xhci: Prevent futile URB re-submissions due to incorrect return value (git-fixes).
- xhci: re-initialize the HC during resume if HCE was set (git-fixes).
Patchnames
SUSE-2022-1038,SUSE-SLE-Module-RT-15-SP3-2022-1038,SUSE-SUSE-MicroOS-5.1-2022-1038
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-25636: Fixed an issue which allowed a local users to gain privileges because of a heap out-of-bounds write in nf_dup_netdev.c, related to nf_tables_offload (bsc#1196299).\n- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could trigger crash the system or corrupt system memory (bsc#1196830).\n- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).\n- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).\n- CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).\n- CVE-2022-24448: Fixed an issue if an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).\n- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)\n- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd(). (bsc#1196155)\n- CVE-2022-25258: The USB Gadget subsystem lacked certain validation of interface OS descriptor requests, which could have lead to memory corruption (bsc#1196096).\n- CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev->buf release (bsc#1195905).\n- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).\n- CVE-2022-27223: In drivers/usb/gadget/udc/udc-xilinx.c the endpoint index was not validated and could have been manipulated by the host for out-of-array access (bsc#1197245).\n- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).\n- CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free vulnerability in unix_scm_to_skb of af_unix (bsc#1193731).\n- CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which allowed attackers to obtain sensitive information from heap memory via crafted frame lengths from a device (bsc#1196836).\n- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)\n- CVE-2021-45402: The check_alu_op function in kernel/bpf/verifier.c did not properly update bounds while handling the mov32 instruction, which allowed local users to obtain potentially sensitive address information (bsc#1196130).\n- CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers. (bsc#1196488)\n\nThe following non-security bugs were fixed:\n\n- ALSA: intel_hdmi: Fix reference to PCM buffer address (git-fixes).\n- arm64: dts: rockchip: Switch RK3399-Gru DP to SPDIF output (git-fixes).\n- ARM: 9182/1: mmu: fix returns from early_param() and __setup() functions (git-fixes).\n- ARM: Fix kgdb breakpoint for Thumb2 (git-fixes).\n- asix: fix uninit-value in asix_mdio_read() (git-fixes).\n- ASoC: cs4265: Fix the duplicated control name (git-fixes).\n- ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min (git-fixes).\n- ASoC: rt5682: do not block workqueue if card is unbound (git-fixes).\n- ata: pata_hpt37x: disable primary channel on HPT371 (git-fixes).\n- ax25: Fix NULL pointer dereference in ax25_kill_by_device (git-fixes).\n- batman-adv: Do not expect inter-netns unique iflink indices (git-fixes).\n- batman-adv: Request iflink once in batadv_get_real_netdevice (git-fixes).\n- batman-adv: Request iflink once in batadv-on-batadv check (git-fixes).\n- blk-mq: do not free tags if the tag_set is used by other device in queue initialztion (bsc#1193787).\n- Bluetooth: btusb: Add missing Chicony device for Realtek RTL8723BE (bsc#1196779).\n- bnxt_en: Fix active FEC reporting to ethtool (jsc#SLE-16649).\n- bnxt_en: Fix incorrect multicast rx mask setting when not requested (git-fixes).\n- bnxt_en: Fix occasional ethtool -t loopback test failures (git-fixes).\n- bnxt_en: Fix offline ethtool selftest with RDMA enabled (git-fixes).\n- bonding: force carrier update when releasing slave (git-fixes).\n- can: gs_usb: change active_channels's type from atomic_t to u8 (git-fixes).\n- cgroup/cpuset: Fix 'suspicious RCU usage' lockdep warning (bsc#1196868).\n- cgroup-v1: Correct privileges check in release_agent writes (bsc#1196723).\n- clk: jz4725b: fix mmc0 clock gating (git-fixes).\n- constraints: Also adjust disk requirement for x86 and s390.\n- constraints: Increase disk space for aarch64\n- cpufreq: schedutil: Use kobject release() method to free (git-fixes)\n- cpuset: Fix the bug that subpart_cpus updated wrongly in update_cpumask() (bsc#1196866).\n- cputime, cpuacct: Include guest time in user time in (git-fixes)\n- dma-direct: Fix potential NULL pointer dereference (bsc#1196472 ltc#192278).\n- dmaengine: shdma: Fix runtime PM imbalance on error (git-fixes).\n- dma-mapping: Allow mixing bypass and mapped DMA operation (bsc#1196472 ltc#192278).\n- drm/amdgpu: disable MMHUB PG for Picasso (git-fixes).\n- drm/edid: Always set RGB444 (git-fixes).\n- drm/i915/dg1: Wait for pcode/uncore handshake at startup (bsc#1195211).\n- drm/i915/gen11+: Only load DRAM information from pcode (bsc#1195211).\n- drm/i915: Nuke not needed members of dram_info (bsc#1195211).\n- drm/i915: Remove memory frequency calculation (bsc#1195211).\n- drm/i915: Rename is_16gb_dimm to wm_lv_0_adjust_needed (bsc#1195211).\n- drm/sun4i: mixer: Fix P010 and P210 format numbers (git-fixes).\n- EDAC/altera: Fix deferred probing (bsc#1178134).\n- EDAC: Fix calculation of returned address and next offset in edac_align_ptr() (bsc#1178134).\n- efivars: Respect 'block' flag in efivar_entry_set_safe() (git-fixes).\n- exfat: fix i_blocks for files truncated over 4 GiB (git-fixes).\n- exfat: fix incorrect loading of i_blocks for large files (git-fixes).\n- firmware: arm_scmi: Remove space in MODULE_ALIAS name (git-fixes).\n- gianfar: ethtool: Fix refcount leak in gfar_get_ts_info (git-fixes).\n- gpiolib: acpi: Convert ACPI value of debounce to microseconds (git-fixes).\n- gpio: rockchip: Reset int_bothedge when changing trigger (git-fixes).\n- gpio: tegra186: Fix chip_data type confusion (git-fixes).\n- gpio: ts4900: Do not set DAT and OE together (git-fixes).\n- gtp: remove useless rcu_read_lock() (git-fixes).\n- hamradio: fix macro redefine warning (git-fixes).\n- Hand over the maintainership to SLE15-SP3 maintainers\n- HID: add mapping for KEY_ALL_APPLICATIONS (git-fixes).\n- HID: add mapping for KEY_DICTATE (git-fixes).\n- i2c: bcm2835: Avoid clock stretching timeouts (git-fixes).\n- iavf: Fix missing check for running netdev (git-fixes).\n- IB/hfi1: Correct guard on eager buffer deallocation (git-fixes).\n- IB/hfi1: Fix early init panic (git-fixes).\n- IB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr (git-fixes).\n- IB/hfi1: Insure use of smp_processor_id() is preempt disabled (git-fixes).\n- IB/rdmavt: Validate remote_addr during loopback atomic tests (git-fixes).\n- ice: initialize local variable 'tlv' (jsc#SLE-12878).\n- igc: igc_read_phy_reg_gpy: drop premature return (git-fixes).\n- igc: igc_write_phy_reg_gpy: drop premature return (git-fixes).\n- iio: adc: ad7124: fix mask used for setting AIN_BUFP & AIN_BUFM bits (git-fixes).\n- iio: adc: men_z188_adc: Fix a resource leak in an error handling path (git-fixes).\n- iio: Fix error handling for PM (git-fixes).\n- Input: clear BTN_RIGHT/MIDDLE on buttonpads (git-fixes).\n- Input: elan_i2c - fix regulator enable count imbalance after suspend/resume (git-fixes).\n- Input: elan_i2c - move regulator_[en|dis]able() out of elan_[en|dis]able_power() (git-fixes).\n- ixgbe: xsk: change !netif_carrier_ok() handling in ixgbe_xmit_zc() (git-fixes).\n- mac80211: fix forwarded mesh frames AC & queue selection (git-fixes).\n- mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work (git-fixes).\n- mac80211_hwsim: report NOACK frames in tx_status (git-fixes).\n- mask out added spinlock in rndis_params (git-fixes).\n- mmc: meson: Fix usage of meson_mmc_post_req() (git-fixes).\n- net: dsa: mv88e6xxx: MV88E6097 does not support jumbo configuration (git-fixes).\n- net: ethernet: ti: cpsw: disable PTPv1 hw timestamping advertisement (git-fixes).\n- netfilter: nf_tables: fix memory leak during stateful obj update (bsc#1176447).\n- net: fix up skbs delta_truesize in UDP GRO frag_list (bsc#1176447).\n- net: hns3: Clear the CMDQ registers before unmapping BAR region (git-fixes).\n- net/mlx5e: Fix modify header actions memory leak (git-fixes).\n- net/mlx5e: Fix page DMA map/unmap attributes (bsc#1196468).\n- net/mlx5e: Fix wrong return value on ioctl EEPROM query failure (git-fixes).\n- net/mlx5e: kTLS, Use CHECKSUM_UNNECESSARY for device-offloaded packets (jsc#SLE-15172).\n- net/mlx5e: TC, Reject rules with drop and modify hdr action (git-fixes).\n- net/mlx5e: TC, Reject rules with forward and drop actions (git-fixes).\n- net/mlx5: Fix possible deadlock on rule deletion (git-fixes).\n- net/mlx5: Fix wrong limitation of metadata match on ecpf (git-fixes).\n- net/mlx5: Update the list of the PCI supported devices (git-fixes).\n- net: phy: DP83822: clear MISR2 register to disable interrupts (git-fixes).\n- net/sched: act_ct: Fix flow table lookup after ct clear or switching zones (jsc#SLE-15172).\n- netsec: ignore 'phy-mode' device property on ACPI systems (git-fixes).\n- net: sfc: Replace in_interrupt() usage (git-fixes).\n- net: tipc: validate domain record count on input (bsc#1195254).\n- net: usb: cdc_mbim: avoid altsetting toggling for Telit FN990 (git-fixes).\n- NFC: port100: fix use-after-free in port100_send_complete (git-fixes).\n- nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() (git-fixes).\n- nl80211: Handle nla_memdup failures in handle_nan_filter (git-fixes).\n- ntb: intel: fix port config status offset for SPR (git-fixes).\n- nvme: fix a possible use-after-free in controller reset during load (git-fixes).\n- nvme-multipath: use vmalloc for ANA log buffer (bsc#1193787).\n- nvme-rdma: fix possible use-after-free in transport error_recovery work (git-fixes).\n- nvme-tcp: fix possible use-after-free in transport error_recovery work (git-fixes).\n- powerpc/dma: Fallback to dma_ops when persistent memory present (bsc#1196472 ltc#192278).\n- powerpc/fadump: register for fadump as early as possible (bsc#1179439 ltc#190038).\n- powerpc/mm: Remove dcache flush from memory remove (bsc#1196433 ltc#196449).\n- powerpc/powernv/memtrace: Fix dcache flushing (bsc#1196433 ltc#196449).\n- powerpc/pseries/iommu: Fix window size for direct mapping with pmem (bsc#1196472 ltc#192278).\n- RDMA/bnxt_re: Scan the whole bitmap when checking if 'disabling RCFW with pending cmd-bit' (git-fixes).\n- RDMA/cma: Do not change route.addr.src_addr outside state checks (bsc#1181147).\n- RDMA/cma: Let cma_resolve_ib_dev() continue search even after empty entry (git-fixes).\n- RDMA/cma: Remove open coding of overflow checking for private_data_len (git-fixes).\n- RDMA/core: Do not infoleak GRH fields (git-fixes).\n- RDMA/core: Let ib_find_gid() continue search even after empty entry (git-fixes).\n- RDMA/cxgb4: Set queue pair state when being queried (git-fixes).\n- RDMA/hns: Validate the pkey index (git-fixes).\n- RDMA/ib_srp: Fix a deadlock (git-fixes).\n- RDMA/mlx4: Do not continue event handler after memory allocation failure (git-fixes).\n- RDMA/rtrs-clt: Fix possible double free in error case (jsc#SLE-15176).\n- RDMA/rxe: Fix a typo in opcode name (git-fixes).\n- RDMA/siw: Fix broken RDMA Read Fence/Resume logic (git-fixes).\n- RDMA/uverbs: Check for null return of kmalloc_array (git-fixes).\n- RDMA/uverbs: Remove the unnecessary assignment (git-fixes).\n- README.BRANCH: Add Frederic Weisbecker as branch maintainer\n- README.BRANCH: Remove Davidlohr Bueso as a branch maintainer\n- rpm/arch-symbols,guards,*driver: Replace Novell with SUSE.\n- rpm: SC2006: Use $(...) notation instead of legacy backticked `...`.\n- sched/core: Mitigate race (git-fixes)\n- scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() (git-fixes).\n- scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe (git-fixes).\n- scsi: lpfc: Terminate string in lpfc_debugfs_nvmeio_trc_write() (git-fixes).\n- scsi: nsp_cs: Check of ioremap return value (git-fixes).\n- scsi: qedf: Fix potential dereference of NULL pointer (git-fixes).\n- scsi: smartpqi: Add PCI IDs (bsc#1196627).\n- scsi: ufs: Fix race conditions related to driver data (git-fixes).\n- selftests: mlxsw: tc_police_scale: Make test more robust (bsc#1176774).\n- soc: fsl: Correct MAINTAINERS database (QUICC ENGINE LIBRARY) (git-fixes).\n- soc: fsl: Correct MAINTAINERS database (SOC) (git-fixes).\n- soc: fsl: qe: Check of ioremap return value (git-fixes).\n- spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op() (git-fixes).\n- sr9700: sanity check for packet length (bsc#1196836).\n- staging: gdm724x: fix use after free in gdm_lte_rx() (git-fixes).\n- SUNRPC: avoid race between mod_timer() and del_timer_sync() (bnc#1195403).\n- tracing: Fix return value of __setup handlers (git-fixes).\n- tty: n_gsm: fix encoding of control signal octet bit DV (git-fixes).\n- tty: n_gsm: fix proper link termination after failed open (git-fixes).\n- usb: dwc2: Fix Stalling a Non-Isochronous OUT EP (git-fixes).\n- usb: dwc2: gadget: Fix GOUTNAK flow for Slave mode (git-fixes).\n- usb: dwc2: gadget: Fix kill_all_requests race (git-fixes).\n- usb: dwc2: use well defined macros for power_down (git-fixes).\n- usb: dwc3: gadget: Let the interrupt handler disable bottom halves (git-fixes).\n- usb: dwc3: meson-g12a: Disable the regulator in the error handling path of the probe (git-fixes).\n- usb: dwc3: pci: Fix Bay Trail phy GPIO mappings (git-fixes).\n- usb: gadget: rndis: add spinlock for rndis response list (git-fixes).\n- USB: gadget: validate endpoint index for xilinx udc (git-fixes).\n- USB: gadget: validate interface OS descriptor requests (git-fixes).\n- usb: host: xen-hcd: add missing unlock in error path (git-fixes).\n- USB: hub: Clean up use of port initialization schemes and retries (git-fixes).\n- usb: hub: Fix locking issues with address0_mutex (git-fixes).\n- usb: hub: Fix usb enumeration issue due to address0 race (git-fixes).\n- USB: serial: option: add support for DW5829e (git-fixes).\n- USB: serial: option: add Telit LE910R1 compositions (git-fixes).\n- USB: zaurus: support another broken Zaurus (git-fixes).\n- vrf: Fix fast path output packet handling with async Netfilter rules (git-fixes).\n- xen/usb: do not use gnttab_end_foreign_access() in xenhcd_gnttab_done() (bsc#1196488, XSA-396).\n- xhci: Prevent futile URB re-submissions due to incorrect return value (git-fixes).\n- xhci: re-initialize the HC during resume if HCE was set (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-1038,SUSE-SLE-Module-RT-15-SP3-2022-1038,SUSE-SUSE-MicroOS-5.1-2022-1038", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_1038-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:1038-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20221038-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:1038-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html", }, { category: "self", summary: "SUSE Bug 1176447", url: "https://bugzilla.suse.com/1176447", }, { category: "self", summary: "SUSE Bug 1176774", url: "https://bugzilla.suse.com/1176774", }, { category: "self", summary: "SUSE Bug 1178134", url: "https://bugzilla.suse.com/1178134", }, { category: "self", summary: "SUSE Bug 1179439", url: "https://bugzilla.suse.com/1179439", }, { category: "self", summary: "SUSE Bug 1181147", url: "https://bugzilla.suse.com/1181147", }, { category: "self", summary: "SUSE Bug 1191428", url: "https://bugzilla.suse.com/1191428", }, { category: "self", summary: "SUSE Bug 1192273", url: "https://bugzilla.suse.com/1192273", }, { category: "self", summary: "SUSE Bug 1193787", url: "https://bugzilla.suse.com/1193787", }, { category: "self", summary: "SUSE Bug 1194516", url: "https://bugzilla.suse.com/1194516", }, { category: "self", summary: "SUSE Bug 1194943", url: "https://bugzilla.suse.com/1194943", }, { category: "self", summary: "SUSE Bug 1195051", url: "https://bugzilla.suse.com/1195051", }, { category: "self", summary: "SUSE Bug 1195211", url: "https://bugzilla.suse.com/1195211", }, { category: "self", summary: "SUSE Bug 1195353", url: "https://bugzilla.suse.com/1195353", }, { category: "self", summary: "SUSE Bug 1195403", url: "https://bugzilla.suse.com/1195403", }, { category: "self", summary: "SUSE Bug 1195516", url: "https://bugzilla.suse.com/1195516", }, { category: "self", summary: "SUSE Bug 1195612", url: "https://bugzilla.suse.com/1195612", }, { category: "self", summary: "SUSE Bug 1195897", url: "https://bugzilla.suse.com/1195897", }, { category: "self", summary: "SUSE Bug 1195908", url: "https://bugzilla.suse.com/1195908", }, { category: "self", summary: "SUSE Bug 1195947", url: "https://bugzilla.suse.com/1195947", }, { category: "self", summary: "SUSE Bug 1195949", url: "https://bugzilla.suse.com/1195949", }, { category: "self", summary: "SUSE Bug 1195987", url: "https://bugzilla.suse.com/1195987", }, { category: "self", summary: "SUSE Bug 1196079", url: "https://bugzilla.suse.com/1196079", }, { category: "self", summary: "SUSE Bug 1196095", url: "https://bugzilla.suse.com/1196095", }, { category: "self", summary: "SUSE Bug 1196130", url: "https://bugzilla.suse.com/1196130", }, { category: "self", summary: "SUSE Bug 1196155", url: "https://bugzilla.suse.com/1196155", }, { category: "self", summary: "SUSE Bug 1196299", url: "https://bugzilla.suse.com/1196299", }, { category: "self", summary: "SUSE Bug 1196301", url: "https://bugzilla.suse.com/1196301", }, { category: "self", summary: "SUSE Bug 1196403", url: "https://bugzilla.suse.com/1196403", }, { category: "self", summary: "SUSE Bug 1196468", url: "https://bugzilla.suse.com/1196468", }, { category: "self", summary: "SUSE Bug 1196472", url: "https://bugzilla.suse.com/1196472", }, { category: "self", summary: "SUSE Bug 1196488", url: "https://bugzilla.suse.com/1196488", }, { category: "self", summary: "SUSE Bug 1196627", url: "https://bugzilla.suse.com/1196627", }, { category: "self", summary: "SUSE Bug 1196723", url: "https://bugzilla.suse.com/1196723", }, { category: "self", summary: "SUSE Bug 1196776", url: "https://bugzilla.suse.com/1196776", }, { category: "self", summary: "SUSE Bug 1196779", url: "https://bugzilla.suse.com/1196779", }, { category: "self", summary: "SUSE Bug 1196830", url: "https://bugzilla.suse.com/1196830", }, { category: "self", summary: "SUSE Bug 1196866", url: "https://bugzilla.suse.com/1196866", }, { category: "self", summary: "SUSE Bug 1196868", url: "https://bugzilla.suse.com/1196868", }, { category: "self", summary: "SUSE Bug 1197300", url: "https://bugzilla.suse.com/1197300", }, { category: "self", summary: "SUSE Bug 922815", url: "https://bugzilla.suse.com/922815", }, { category: "self", summary: "SUSE Bug 998635", url: "https://bugzilla.suse.com/998635", }, { category: "self", summary: "SUSE CVE CVE-2021-0920 page", url: "https://www.suse.com/security/cve/CVE-2021-0920/", }, { category: "self", summary: "SUSE CVE CVE-2021-39698 page", url: "https://www.suse.com/security/cve/CVE-2021-39698/", }, { category: "self", summary: "SUSE CVE CVE-2021-44879 page", url: "https://www.suse.com/security/cve/CVE-2021-44879/", }, { category: "self", summary: "SUSE CVE CVE-2021-45402 page", url: "https://www.suse.com/security/cve/CVE-2021-45402/", }, { category: "self", summary: "SUSE CVE CVE-2022-0487 page", url: "https://www.suse.com/security/cve/CVE-2022-0487/", }, { category: "self", summary: "SUSE CVE CVE-2022-0492 page", url: "https://www.suse.com/security/cve/CVE-2022-0492/", }, { category: "self", summary: "SUSE CVE CVE-2022-0516 page", url: "https://www.suse.com/security/cve/CVE-2022-0516/", }, { category: "self", summary: "SUSE CVE CVE-2022-0617 page", url: "https://www.suse.com/security/cve/CVE-2022-0617/", }, { category: "self", summary: "SUSE CVE CVE-2022-0644 page", url: "https://www.suse.com/security/cve/CVE-2022-0644/", }, { category: "self", summary: "SUSE CVE CVE-2022-23036 page", url: "https://www.suse.com/security/cve/CVE-2022-23036/", }, { category: "self", summary: "SUSE CVE CVE-2022-23037 page", url: "https://www.suse.com/security/cve/CVE-2022-23037/", }, { category: "self", summary: "SUSE CVE CVE-2022-23038 page", url: "https://www.suse.com/security/cve/CVE-2022-23038/", }, { category: "self", summary: "SUSE CVE CVE-2022-23039 page", url: "https://www.suse.com/security/cve/CVE-2022-23039/", }, { category: "self", summary: "SUSE CVE CVE-2022-23040 page", url: "https://www.suse.com/security/cve/CVE-2022-23040/", }, { category: "self", summary: "SUSE CVE CVE-2022-23041 page", url: "https://www.suse.com/security/cve/CVE-2022-23041/", }, { category: "self", summary: "SUSE CVE CVE-2022-23042 page", url: "https://www.suse.com/security/cve/CVE-2022-23042/", }, { category: "self", summary: "SUSE CVE CVE-2022-24448 page", url: "https://www.suse.com/security/cve/CVE-2022-24448/", }, { category: "self", summary: "SUSE CVE CVE-2022-24958 page", url: "https://www.suse.com/security/cve/CVE-2022-24958/", }, { category: "self", summary: "SUSE CVE CVE-2022-24959 page", url: "https://www.suse.com/security/cve/CVE-2022-24959/", }, { category: "self", summary: "SUSE CVE CVE-2022-25258 page", url: "https://www.suse.com/security/cve/CVE-2022-25258/", }, { category: "self", summary: "SUSE CVE CVE-2022-25636 page", url: "https://www.suse.com/security/cve/CVE-2022-25636/", }, { category: "self", summary: "SUSE CVE CVE-2022-26490 page", url: "https://www.suse.com/security/cve/CVE-2022-26490/", }, { category: "self", summary: "SUSE CVE CVE-2022-26966 page", url: "https://www.suse.com/security/cve/CVE-2022-26966/", }, { category: "self", summary: "SUSE CVE CVE-2022-27223 page", url: "https://www.suse.com/security/cve/CVE-2022-27223/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2022-03-30T07:37:14Z", generator: { date: "2022-03-30T07:37:14Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:1038-1", initial_release_date: "2022-03-30T07:37:14Z", revision_history: [ { date: "2022-03-30T07:37:14Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-rt-5.3.18-150300.82.1.noarch", product: { name: "kernel-devel-rt-5.3.18-150300.82.1.noarch", product_id: "kernel-devel-rt-5.3.18-150300.82.1.noarch", }, }, { category: "product_version", name: "kernel-source-rt-5.3.18-150300.82.1.noarch", product: { name: "kernel-source-rt-5.3.18-150300.82.1.noarch", product_id: "kernel-source-rt-5.3.18-150300.82.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", product: { name: "cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", product_id: "cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-rt_debug-5.3.18-150300.82.1.x86_64", product: { name: "cluster-md-kmp-rt_debug-5.3.18-150300.82.1.x86_64", product_id: "cluster-md-kmp-rt_debug-5.3.18-150300.82.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt-5.3.18-150300.82.1.x86_64", product: { name: "dlm-kmp-rt-5.3.18-150300.82.1.x86_64", product_id: "dlm-kmp-rt-5.3.18-150300.82.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt_debug-5.3.18-150300.82.1.x86_64", product: { name: "dlm-kmp-rt_debug-5.3.18-150300.82.1.x86_64", product_id: "dlm-kmp-rt_debug-5.3.18-150300.82.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", product: { name: "gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", product_id: "gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt_debug-5.3.18-150300.82.1.x86_64", product: { name: "gfs2-kmp-rt_debug-5.3.18-150300.82.1.x86_64", product_id: "gfs2-kmp-rt_debug-5.3.18-150300.82.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-5.3.18-150300.82.1.x86_64", product: { name: "kernel-rt-5.3.18-150300.82.1.x86_64", product_id: "kernel-rt-5.3.18-150300.82.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-devel-5.3.18-150300.82.1.x86_64", product: { name: "kernel-rt-devel-5.3.18-150300.82.1.x86_64", product_id: "kernel-rt-devel-5.3.18-150300.82.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-extra-5.3.18-150300.82.1.x86_64", product: { name: "kernel-rt-extra-5.3.18-150300.82.1.x86_64", product_id: "kernel-rt-extra-5.3.18-150300.82.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-livepatch-devel-5.3.18-150300.82.1.x86_64", product: { name: "kernel-rt-livepatch-devel-5.3.18-150300.82.1.x86_64", product_id: "kernel-rt-livepatch-devel-5.3.18-150300.82.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-optional-5.3.18-150300.82.1.x86_64", product: { name: "kernel-rt-optional-5.3.18-150300.82.1.x86_64", product_id: "kernel-rt-optional-5.3.18-150300.82.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-5.3.18-150300.82.1.x86_64", product: { name: "kernel-rt_debug-5.3.18-150300.82.1.x86_64", product_id: "kernel-rt_debug-5.3.18-150300.82.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", product: { name: "kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", product_id: "kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-extra-5.3.18-150300.82.1.x86_64", product: { name: "kernel-rt_debug-extra-5.3.18-150300.82.1.x86_64", product_id: "kernel-rt_debug-extra-5.3.18-150300.82.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-livepatch-devel-5.3.18-150300.82.1.x86_64", product: { name: "kernel-rt_debug-livepatch-devel-5.3.18-150300.82.1.x86_64", product_id: "kernel-rt_debug-livepatch-devel-5.3.18-150300.82.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-optional-5.3.18-150300.82.1.x86_64", product: { name: "kernel-rt_debug-optional-5.3.18-150300.82.1.x86_64", product_id: "kernel-rt_debug-optional-5.3.18-150300.82.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-rt-5.3.18-150300.82.1.x86_64", product: { name: "kernel-syms-rt-5.3.18-150300.82.1.x86_64", product_id: "kernel-syms-rt-5.3.18-150300.82.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt-5.3.18-150300.82.1.x86_64", product: { name: "kselftests-kmp-rt-5.3.18-150300.82.1.x86_64", product_id: "kselftests-kmp-rt-5.3.18-150300.82.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt_debug-5.3.18-150300.82.1.x86_64", product: { name: "kselftests-kmp-rt_debug-5.3.18-150300.82.1.x86_64", product_id: "kselftests-kmp-rt_debug-5.3.18-150300.82.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", product: { name: "ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", product_id: "ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt_debug-5.3.18-150300.82.1.x86_64", product: { name: "ocfs2-kmp-rt_debug-5.3.18-150300.82.1.x86_64", product_id: "ocfs2-kmp-rt_debug-5.3.18-150300.82.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-rt-5.3.18-150300.82.1.x86_64", product: { name: "reiserfs-kmp-rt-5.3.18-150300.82.1.x86_64", product_id: "reiserfs-kmp-rt-5.3.18-150300.82.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-rt_debug-5.3.18-150300.82.1.x86_64", product: { name: "reiserfs-kmp-rt_debug-5.3.18-150300.82.1.x86_64", product_id: "reiserfs-kmp-rt_debug-5.3.18-150300.82.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Real Time Module 15 SP3", product: { name: "SUSE Real Time Module 15 SP3", product_id: "SUSE Real Time Module 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-rt:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Micro 5.1", product: { name: "SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-microos:5.1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64 as component of SUSE Real Time Module 15 SP3", product_id: "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", }, product_reference: "cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-rt-5.3.18-150300.82.1.x86_64 as component of SUSE Real Time Module 15 SP3", product_id: "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", }, product_reference: "dlm-kmp-rt-5.3.18-150300.82.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-rt-5.3.18-150300.82.1.x86_64 as component of SUSE Real Time Module 15 SP3", product_id: "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", }, product_reference: "gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-rt-5.3.18-150300.82.1.noarch as component of SUSE Real Time Module 15 SP3", product_id: "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", }, product_reference: "kernel-devel-rt-5.3.18-150300.82.1.noarch", relates_to_product_reference: "SUSE Real Time Module 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.3.18-150300.82.1.x86_64 as component of SUSE Real Time Module 15 SP3", product_id: "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", }, product_reference: "kernel-rt-5.3.18-150300.82.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-5.3.18-150300.82.1.x86_64 as component of SUSE Real Time Module 15 SP3", product_id: "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", }, product_reference: "kernel-rt-devel-5.3.18-150300.82.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64 as component of SUSE Real Time Module 15 SP3", product_id: "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", }, product_reference: "kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-5.3.18-150300.82.1.noarch as component of SUSE Real Time Module 15 SP3", product_id: "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", }, product_reference: "kernel-source-rt-5.3.18-150300.82.1.noarch", relates_to_product_reference: "SUSE Real Time Module 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-rt-5.3.18-150300.82.1.x86_64 as component of SUSE Real Time Module 15 SP3", product_id: "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", }, product_reference: "kernel-syms-rt-5.3.18-150300.82.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64 as component of SUSE Real Time Module 15 SP3", product_id: "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", }, product_reference: "ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.3.18-150300.82.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", }, product_reference: "kernel-rt-5.3.18-150300.82.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, ], }, vulnerabilities: [ { cve: "CVE-2021-0920", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-0920", }, ], notes: [ { category: "general", text: "In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-0920", url: "https://www.suse.com/security/cve/CVE-2021-0920", }, { category: "external", summary: "SUSE Bug 1193731 for CVE-2021-0920", url: "https://bugzilla.suse.com/1193731", }, { category: "external", summary: "SUSE Bug 1194463 for CVE-2021-0920", url: "https://bugzilla.suse.com/1194463", }, { category: "external", summary: "SUSE Bug 1195939 for CVE-2021-0920", url: "https://bugzilla.suse.com/1195939", }, { category: "external", summary: "SUSE Bug 1199255 for CVE-2021-0920", url: "https://bugzilla.suse.com/1199255", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2021-0920", url: "https://bugzilla.suse.com/1200084", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:14Z", details: "important", }, ], title: "CVE-2021-0920", }, { cve: "CVE-2021-39698", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39698", }, ], notes: [ { category: "general", text: "In aio_poll_complete_work of aio.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-185125206References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39698", url: "https://www.suse.com/security/cve/CVE-2021-39698", }, { category: "external", summary: "SUSE Bug 1196956 for CVE-2021-39698", url: "https://bugzilla.suse.com/1196956", }, { category: "external", summary: "SUSE Bug 1196959 for CVE-2021-39698", url: "https://bugzilla.suse.com/1196959", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2021-39698", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:14Z", details: "important", }, ], title: "CVE-2021-39698", }, { cve: "CVE-2021-44879", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-44879", }, ], notes: [ { category: "general", text: "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-44879", url: "https://www.suse.com/security/cve/CVE-2021-44879", }, { category: "external", summary: "SUSE Bug 1195987 for CVE-2021-44879", url: "https://bugzilla.suse.com/1195987", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:14Z", details: "moderate", }, ], title: "CVE-2021-44879", }, { cve: "CVE-2021-45402", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-45402", }, ], notes: [ { category: "general", text: "The check_alu_op() function in kernel/bpf/verifier.c in the Linux kernel through v5.16-rc5 did not properly update bounds while handling the mov32 instruction, which allows local users to obtain potentially sensitive address information, aka a \"pointer leak.\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-45402", url: "https://www.suse.com/security/cve/CVE-2021-45402", }, { category: "external", summary: "SUSE Bug 1196130 for CVE-2021-45402", url: "https://bugzilla.suse.com/1196130", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:14Z", details: "moderate", }, ], title: "CVE-2021-45402", }, { cve: "CVE-2022-0487", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0487", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0487", url: "https://www.suse.com/security/cve/CVE-2022-0487", }, { category: "external", summary: "SUSE Bug 1194516 for CVE-2022-0487", url: "https://bugzilla.suse.com/1194516", }, { category: "external", summary: "SUSE Bug 1195949 for CVE-2022-0487", url: "https://bugzilla.suse.com/1195949", }, { category: "external", summary: "SUSE Bug 1198615 for CVE-2022-0487", url: "https://bugzilla.suse.com/1198615", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:14Z", details: "moderate", }, ], title: "CVE-2022-0487", }, { cve: "CVE-2022-0492", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0492", }, ], notes: [ { category: "general", text: "A vulnerability was found in the Linux kernel's cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0492", url: "https://www.suse.com/security/cve/CVE-2022-0492", }, { category: "external", summary: "SUSE Bug 1195543 for CVE-2022-0492", url: "https://bugzilla.suse.com/1195543", }, { category: "external", summary: "SUSE Bug 1195908 for CVE-2022-0492", url: "https://bugzilla.suse.com/1195908", }, { category: "external", summary: "SUSE Bug 1196612 for CVE-2022-0492", url: "https://bugzilla.suse.com/1196612", }, { category: "external", summary: "SUSE Bug 1196776 for CVE-2022-0492", url: "https://bugzilla.suse.com/1196776", }, { category: "external", summary: "SUSE Bug 1198615 for CVE-2022-0492", url: "https://bugzilla.suse.com/1198615", }, { category: "external", summary: "SUSE Bug 1199255 for CVE-2022-0492", url: "https://bugzilla.suse.com/1199255", }, { category: "external", summary: "SUSE Bug 1199615 for CVE-2022-0492", url: "https://bugzilla.suse.com/1199615", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2022-0492", url: "https://bugzilla.suse.com/1200084", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:14Z", details: "moderate", }, ], title: "CVE-2022-0492", }, { cve: "CVE-2022-0516", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0516", }, ], notes: [ { category: "general", text: "A vulnerability was found in kvm_s390_guest_sida_op in the arch/s390/kvm/kvm-s390.c function in KVM for s390 in the Linux kernel. This flaw allows a local attacker with a normal user privilege to obtain unauthorized memory write access. This flaw affects Linux kernel versions prior to 5.17-rc4.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0516", url: "https://www.suse.com/security/cve/CVE-2022-0516", }, { category: "external", summary: "SUSE Bug 1195516 for CVE-2022-0516", url: "https://bugzilla.suse.com/1195516", }, { category: "external", summary: "SUSE Bug 1195947 for CVE-2022-0516", url: "https://bugzilla.suse.com/1195947", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:14Z", details: "important", }, ], title: "CVE-2022-0516", }, { cve: "CVE-2022-0617", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0617", }, ], notes: [ { category: "general", text: "A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0617", url: "https://www.suse.com/security/cve/CVE-2022-0617", }, { category: "external", summary: "SUSE Bug 1196079 for CVE-2022-0617", url: "https://bugzilla.suse.com/1196079", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:14Z", details: "moderate", }, ], title: "CVE-2022-0617", }, { cve: "CVE-2022-0644", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0644", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0644", url: "https://www.suse.com/security/cve/CVE-2022-0644", }, { category: "external", summary: "SUSE Bug 1196155 for CVE-2022-0644", url: "https://bugzilla.suse.com/1196155", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:14Z", details: "moderate", }, ], title: "CVE-2022-0644", }, { cve: "CVE-2022-23036", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-23036", }, ], notes: [ { category: "general", text: "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-23036", url: "https://www.suse.com/security/cve/CVE-2022-23036", }, { category: "external", summary: "SUSE Bug 1196488 for CVE-2022-23036", url: "https://bugzilla.suse.com/1196488", }, { category: "external", summary: "SUSE Bug 1199099 for CVE-2022-23036", url: "https://bugzilla.suse.com/1199099", }, { category: "external", summary: "SUSE Bug 1199141 for CVE-2022-23036", url: "https://bugzilla.suse.com/1199141", }, { category: "external", summary: "SUSE Bug 1204132 for CVE-2022-23036", url: "https://bugzilla.suse.com/1204132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:14Z", details: "important", }, ], title: "CVE-2022-23036", }, { cve: "CVE-2022-23037", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-23037", }, ], notes: [ { category: "general", text: "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-23037", url: "https://www.suse.com/security/cve/CVE-2022-23037", }, { category: "external", summary: "SUSE Bug 1199099 for CVE-2022-23037", url: "https://bugzilla.suse.com/1199099", }, { category: "external", summary: "SUSE Bug 1199141 for CVE-2022-23037", url: "https://bugzilla.suse.com/1199141", }, { category: "external", summary: "SUSE Bug 1204132 for CVE-2022-23037", url: "https://bugzilla.suse.com/1204132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:14Z", details: "important", }, ], title: "CVE-2022-23037", }, { cve: "CVE-2022-23038", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-23038", }, ], notes: [ { category: "general", text: "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-23038", url: "https://www.suse.com/security/cve/CVE-2022-23038", }, { category: "external", summary: "SUSE Bug 1199099 for CVE-2022-23038", url: "https://bugzilla.suse.com/1199099", }, { category: "external", summary: "SUSE Bug 1199141 for CVE-2022-23038", url: "https://bugzilla.suse.com/1199141", }, { category: "external", summary: "SUSE Bug 1204132 for CVE-2022-23038", url: "https://bugzilla.suse.com/1204132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:14Z", details: "important", }, ], title: "CVE-2022-23038", }, { cve: "CVE-2022-23039", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-23039", }, ], notes: [ { category: "general", text: "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-23039", url: "https://www.suse.com/security/cve/CVE-2022-23039", }, { category: "external", summary: "SUSE Bug 1199099 for CVE-2022-23039", url: "https://bugzilla.suse.com/1199099", }, { category: "external", summary: "SUSE Bug 1199141 for CVE-2022-23039", url: "https://bugzilla.suse.com/1199141", }, { category: "external", summary: "SUSE Bug 1204132 for CVE-2022-23039", url: "https://bugzilla.suse.com/1204132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:14Z", details: "important", }, ], title: "CVE-2022-23039", }, { cve: "CVE-2022-23040", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-23040", }, ], notes: [ { category: "general", text: "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-23040", url: "https://www.suse.com/security/cve/CVE-2022-23040", }, { category: "external", summary: "SUSE Bug 1199099 for CVE-2022-23040", url: "https://bugzilla.suse.com/1199099", }, { category: "external", summary: "SUSE Bug 1199141 for CVE-2022-23040", url: "https://bugzilla.suse.com/1199141", }, { category: "external", summary: "SUSE Bug 1204132 for CVE-2022-23040", url: "https://bugzilla.suse.com/1204132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:14Z", details: "important", }, ], title: "CVE-2022-23040", }, { cve: "CVE-2022-23041", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-23041", }, ], notes: [ { category: "general", text: "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-23041", url: "https://www.suse.com/security/cve/CVE-2022-23041", }, { category: "external", summary: "SUSE Bug 1199099 for CVE-2022-23041", url: "https://bugzilla.suse.com/1199099", }, { category: "external", summary: "SUSE Bug 1199141 for CVE-2022-23041", url: "https://bugzilla.suse.com/1199141", }, { category: "external", summary: "SUSE Bug 1204132 for CVE-2022-23041", url: "https://bugzilla.suse.com/1204132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:14Z", details: "important", }, ], title: "CVE-2022-23041", }, { cve: "CVE-2022-23042", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-23042", }, ], notes: [ { category: "general", text: "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-23042", url: "https://www.suse.com/security/cve/CVE-2022-23042", }, { category: "external", summary: "SUSE Bug 1199099 for CVE-2022-23042", url: "https://bugzilla.suse.com/1199099", }, { category: "external", summary: "SUSE Bug 1199141 for CVE-2022-23042", url: "https://bugzilla.suse.com/1199141", }, { category: "external", summary: "SUSE Bug 1204132 for CVE-2022-23042", url: "https://bugzilla.suse.com/1204132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:14Z", details: "important", }, ], title: "CVE-2022-23042", }, { cve: "CVE-2022-24448", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-24448", }, ], notes: [ { category: "general", text: "An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-24448", url: "https://www.suse.com/security/cve/CVE-2022-24448", }, { category: "external", summary: "SUSE Bug 1195612 for CVE-2022-24448", url: "https://bugzilla.suse.com/1195612", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:14Z", details: "moderate", }, ], title: "CVE-2022-24448", }, { cve: "CVE-2022-24958", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-24958", }, ], notes: [ { category: "general", text: "drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev->buf release.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-24958", url: "https://www.suse.com/security/cve/CVE-2022-24958", }, { category: "external", summary: "SUSE Bug 1195905 for CVE-2022-24958", url: "https://bugzilla.suse.com/1195905", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:14Z", details: "moderate", }, ], title: "CVE-2022-24958", }, { cve: "CVE-2022-24959", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-24959", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-24959", url: "https://www.suse.com/security/cve/CVE-2022-24959", }, { category: "external", summary: "SUSE Bug 1195897 for CVE-2022-24959", url: "https://bugzilla.suse.com/1195897", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:14Z", details: "moderate", }, ], title: "CVE-2022-24959", }, { cve: "CVE-2022-25258", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-25258", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-25258", url: "https://www.suse.com/security/cve/CVE-2022-25258", }, { category: "external", summary: "SUSE Bug 1196095 for CVE-2022-25258", url: "https://bugzilla.suse.com/1196095", }, { category: "external", summary: "SUSE Bug 1196132 for CVE-2022-25258", url: "https://bugzilla.suse.com/1196132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:14Z", details: "important", }, ], title: "CVE-2022-25258", }, { cve: "CVE-2022-25636", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-25636", }, ], notes: [ { category: "general", text: "net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows local users to gain privileges because of a heap out-of-bounds write. This is related to nf_tables_offload.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-25636", url: "https://www.suse.com/security/cve/CVE-2022-25636", }, { category: "external", summary: "SUSE Bug 1196299 for CVE-2022-25636", url: "https://bugzilla.suse.com/1196299", }, { category: "external", summary: "SUSE Bug 1196301 for CVE-2022-25636", url: "https://bugzilla.suse.com/1196301", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:14Z", details: "important", }, ], title: "CVE-2022-25636", }, { cve: "CVE-2022-26490", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-26490", }, ], notes: [ { category: "general", text: "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-26490", url: "https://www.suse.com/security/cve/CVE-2022-26490", }, { category: "external", summary: "SUSE Bug 1196830 for CVE-2022-26490", url: "https://bugzilla.suse.com/1196830", }, { category: "external", summary: "SUSE Bug 1201656 for CVE-2022-26490", url: "https://bugzilla.suse.com/1201656", }, { category: "external", summary: "SUSE Bug 1201969 for CVE-2022-26490", url: "https://bugzilla.suse.com/1201969", }, { category: "external", summary: "SUSE Bug 1211495 for CVE-2022-26490", url: "https://bugzilla.suse.com/1211495", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:14Z", details: "important", }, ], title: "CVE-2022-26490", }, { cve: "CVE-2022-26966", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-26966", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.16.12. drivers/net/usb/sr9700.c allows attackers to obtain sensitive information from heap memory via crafted frame lengths from a device.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-26966", url: "https://www.suse.com/security/cve/CVE-2022-26966", }, { category: "external", summary: "SUSE Bug 1196836 for CVE-2022-26966", url: "https://bugzilla.suse.com/1196836", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:14Z", details: "moderate", }, ], title: "CVE-2022-26966", }, { cve: "CVE-2022-27223", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-27223", }, ], notes: [ { category: "general", text: "In drivers/usb/gadget/udc/udc-xilinx.c in the Linux kernel before 5.16.12, the endpoint index is not validated and might be manipulated by the host for out-of-array access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-27223", url: "https://www.suse.com/security/cve/CVE-2022-27223", }, { category: "external", summary: "SUSE Bug 1197245 for CVE-2022-27223", url: "https://bugzilla.suse.com/1197245", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.82.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.82.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.82.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:14Z", details: "moderate", }, ], title: "CVE-2022-27223", }, ], }
suse-su-2022:0759-1
Vulnerability from csaf_suse
Published
2022-03-08 18:06
Modified
2022-03-08 18:06
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.
Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.
The following security bugs were fixed:
- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
- CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (bsc#1196235).
- CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).
- CVE-2022-25258: The USB Gadget subsystem lacked certain validation of interface OS descriptor requests, which could have lead to memory corruption (bsc#1196096).
- CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev->buf release (bsc#1195905).
The following non-security bugs were fixed:
- btrfs: check for missing device in btrfs_trim_fs (bsc#1195701).
- gve: Add RX context (jsc#SLE-23652).
- gve: Add a jumbo-frame device option (jsc#SLE-23652).
- gve: Add consumed counts to ethtool stats (jsc#SLE-23652).
- gve: Add optional metadata descriptor type GVE_TXD_MTD (jsc#SLE-23652).
- gve: Correct order of processing device options (jsc#SLE-23652).
- gve: Fix GFP flags when allocing pages (jsc#SLE-23652).
- gve: Implement packet continuation for RX (jsc#SLE-23652).
- gve: Implement suspend/resume/shutdown (jsc#SLE-23652).
- gve: Move the irq db indexes out of the ntfy block struct (jsc#SLE-23652).
- gve: Recording rx queue before sending to napi (jsc#SLE-23652).
- gve: Update gve_free_queue_page_list signature (jsc#SLE-23652).
- gve: Use kvcalloc() instead of kvzalloc() (jsc#SLE-23652).
- gve: fix for null pointer dereference (jsc#SLE-23652).
- gve: fix the wrong AdminQ buffer queue index check (jsc#SLE-23652).
- gve: fix unmatched u64_stats_update_end() (jsc#SLE-23652).
- gve: remove memory barrier around seqno (jsc#SLE-23652).
- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).
- net: tipc: validate domain record count on input (bsc#1195254).
- nfsd: allow delegation state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow lock state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow open state ids to be revoked and then freed (bsc#1192483).
- nfsd: do not admin-revoke NSv4.0 state ids (bsc#1192483).
- nfsd: prepare for supporting admin-revocation of state (bsc#1192483).
- powerpc/pseries/ddw: Revert 'Extend upper limit for huge DMA window for persistent memory' (bsc#1195995 ltc#196394).
- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).
- scsi: target: iscsi: Fix cmd abort fabric stop race (bsc#1195286).
Patchnames
SUSE-2022-759,SUSE-SLE-Module-Live-Patching-15-SP2-2022-759,SUSE-SLE-Product-HA-15-SP2-2022-759,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-759,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-759,SUSE-SLE-Product-RT-15-SP2-2022-759,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-759,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-759,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-759,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-759,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-759,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-759,SUSE-SUSE-MicroOS-5.0-2022-759,SUSE-Storage-7-2022-759
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.\n\n\nTransient execution side-channel attacks attacking the Branch History Buffer (BHB),\nnamed 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).\n- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).\n- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).\n- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)\n- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).\n- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).\n- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).\n- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).\n- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).\n- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).\n- CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (bsc#1196235).\n- CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).\n- CVE-2022-25258: The USB Gadget subsystem lacked certain validation of interface OS descriptor requests, which could have lead to memory corruption (bsc#1196096).\n- CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev->buf release (bsc#1195905).\n\nThe following non-security bugs were fixed:\n\n- btrfs: check for missing device in btrfs_trim_fs (bsc#1195701).\n- gve: Add RX context (jsc#SLE-23652).\n- gve: Add a jumbo-frame device option (jsc#SLE-23652).\n- gve: Add consumed counts to ethtool stats (jsc#SLE-23652).\n- gve: Add optional metadata descriptor type GVE_TXD_MTD (jsc#SLE-23652).\n- gve: Correct order of processing device options (jsc#SLE-23652).\n- gve: Fix GFP flags when allocing pages (jsc#SLE-23652).\n- gve: Implement packet continuation for RX (jsc#SLE-23652).\n- gve: Implement suspend/resume/shutdown (jsc#SLE-23652).\n- gve: Move the irq db indexes out of the ntfy block struct (jsc#SLE-23652).\n- gve: Recording rx queue before sending to napi (jsc#SLE-23652).\n- gve: Update gve_free_queue_page_list signature (jsc#SLE-23652).\n- gve: Use kvcalloc() instead of kvzalloc() (jsc#SLE-23652).\n- gve: fix for null pointer dereference (jsc#SLE-23652).\n- gve: fix the wrong AdminQ buffer queue index check (jsc#SLE-23652).\n- gve: fix unmatched u64_stats_update_end() (jsc#SLE-23652).\n- gve: remove memory barrier around seqno (jsc#SLE-23652).\n- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).\n- net: tipc: validate domain record count on input (bsc#1195254).\n- nfsd: allow delegation state ids to be revoked and then freed (bsc#1192483).\n- nfsd: allow lock state ids to be revoked and then freed (bsc#1192483).\n- nfsd: allow open state ids to be revoked and then freed (bsc#1192483).\n- nfsd: do not admin-revoke NSv4.0 state ids (bsc#1192483).\n- nfsd: prepare for supporting admin-revocation of state (bsc#1192483).\n- powerpc/pseries/ddw: Revert 'Extend upper limit for huge DMA window for persistent memory' (bsc#1195995 ltc#196394).\n- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).\n- scsi: target: iscsi: Fix cmd abort fabric stop race (bsc#1195286).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-759,SUSE-SLE-Module-Live-Patching-15-SP2-2022-759,SUSE-SLE-Product-HA-15-SP2-2022-759,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-759,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-759,SUSE-SLE-Product-RT-15-SP2-2022-759,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-759,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-759,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-759,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-759,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-759,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-759,SUSE-SUSE-MicroOS-5.0-2022-759,SUSE-Storage-7-2022-759", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0759-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:0759-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20220759-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:0759-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html", }, { category: "self", summary: "SUSE Bug 1189126", url: "https://bugzilla.suse.com/1189126", }, { category: "self", summary: "SUSE Bug 1191580", url: "https://bugzilla.suse.com/1191580", }, { category: "self", summary: "SUSE Bug 1192483", url: "https://bugzilla.suse.com/1192483", }, { category: "self", summary: "SUSE Bug 1194516", url: "https://bugzilla.suse.com/1194516", }, { category: "self", summary: "SUSE Bug 1195254", url: "https://bugzilla.suse.com/1195254", }, { category: "self", summary: "SUSE Bug 1195286", url: "https://bugzilla.suse.com/1195286", }, { category: "self", summary: "SUSE Bug 1195516", url: "https://bugzilla.suse.com/1195516", }, { category: "self", summary: "SUSE Bug 1195543", url: "https://bugzilla.suse.com/1195543", }, { category: "self", summary: "SUSE Bug 1195612", url: "https://bugzilla.suse.com/1195612", }, { category: "self", summary: "SUSE Bug 1195701", url: "https://bugzilla.suse.com/1195701", }, { category: "self", summary: "SUSE Bug 1195897", url: "https://bugzilla.suse.com/1195897", }, { category: "self", summary: "SUSE Bug 1195905", url: "https://bugzilla.suse.com/1195905", }, { category: "self", summary: "SUSE Bug 1195908", url: "https://bugzilla.suse.com/1195908", }, { category: "self", summary: "SUSE Bug 1195947", url: "https://bugzilla.suse.com/1195947", }, { category: "self", summary: "SUSE Bug 1195949", url: "https://bugzilla.suse.com/1195949", }, { category: "self", summary: "SUSE Bug 1195987", url: "https://bugzilla.suse.com/1195987", }, { category: "self", summary: "SUSE Bug 1195995", url: "https://bugzilla.suse.com/1195995", }, { category: "self", summary: "SUSE Bug 1196079", url: "https://bugzilla.suse.com/1196079", }, { category: "self", summary: "SUSE Bug 1196095", url: "https://bugzilla.suse.com/1196095", }, { category: "self", summary: "SUSE Bug 1196132", url: "https://bugzilla.suse.com/1196132", }, { category: "self", summary: "SUSE Bug 1196155", url: "https://bugzilla.suse.com/1196155", }, { category: "self", summary: "SUSE Bug 1196235", url: "https://bugzilla.suse.com/1196235", }, { category: "self", summary: "SUSE Bug 1196584", url: "https://bugzilla.suse.com/1196584", }, { category: "self", summary: "SUSE Bug 1196601", url: "https://bugzilla.suse.com/1196601", }, { category: "self", summary: "SUSE Bug 1196612", url: "https://bugzilla.suse.com/1196612", }, { category: "self", summary: "SUSE Bug 1196776", url: "https://bugzilla.suse.com/1196776", }, { category: "self", summary: "SUSE CVE CVE-2021-44879 page", url: "https://www.suse.com/security/cve/CVE-2021-44879/", }, { category: "self", summary: "SUSE CVE CVE-2022-0001 page", url: "https://www.suse.com/security/cve/CVE-2022-0001/", }, { category: "self", summary: "SUSE CVE CVE-2022-0002 page", url: "https://www.suse.com/security/cve/CVE-2022-0002/", }, { category: "self", summary: "SUSE CVE CVE-2022-0487 page", url: "https://www.suse.com/security/cve/CVE-2022-0487/", }, { category: "self", summary: "SUSE CVE CVE-2022-0492 page", url: "https://www.suse.com/security/cve/CVE-2022-0492/", }, { category: "self", summary: "SUSE CVE CVE-2022-0516 page", url: "https://www.suse.com/security/cve/CVE-2022-0516/", }, { category: "self", summary: "SUSE CVE CVE-2022-0617 page", url: "https://www.suse.com/security/cve/CVE-2022-0617/", }, { category: "self", summary: "SUSE CVE CVE-2022-0644 page", url: "https://www.suse.com/security/cve/CVE-2022-0644/", }, { category: "self", summary: "SUSE CVE CVE-2022-0847 page", url: "https://www.suse.com/security/cve/CVE-2022-0847/", }, { category: "self", summary: "SUSE CVE CVE-2022-24448 page", url: "https://www.suse.com/security/cve/CVE-2022-24448/", }, { category: "self", summary: "SUSE CVE CVE-2022-24958 page", url: "https://www.suse.com/security/cve/CVE-2022-24958/", }, { category: "self", summary: "SUSE CVE CVE-2022-24959 page", url: "https://www.suse.com/security/cve/CVE-2022-24959/", }, { category: "self", summary: "SUSE CVE CVE-2022-25258 page", url: "https://www.suse.com/security/cve/CVE-2022-25258/", }, { category: "self", summary: "SUSE CVE CVE-2022-25375 page", url: "https://www.suse.com/security/cve/CVE-2022-25375/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2022-03-08T18:06:15Z", generator: { date: "2022-03-08T18:06:15Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:0759-1", initial_release_date: "2022-03-08T18:06:15Z", revision_history: [ { date: "2022-03-08T18:06:15Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-24.107.1.aarch64", product: { name: "cluster-md-kmp-default-5.3.18-24.107.1.aarch64", product_id: "cluster-md-kmp-default-5.3.18-24.107.1.aarch64", }, }, { category: "product_version", name: "cluster-md-kmp-preempt-5.3.18-24.107.1.aarch64", product: { name: "cluster-md-kmp-preempt-5.3.18-24.107.1.aarch64", product_id: "cluster-md-kmp-preempt-5.3.18-24.107.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-24.107.1.aarch64", product: { name: "dlm-kmp-default-5.3.18-24.107.1.aarch64", product_id: "dlm-kmp-default-5.3.18-24.107.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-preempt-5.3.18-24.107.1.aarch64", product: { name: "dlm-kmp-preempt-5.3.18-24.107.1.aarch64", product_id: "dlm-kmp-preempt-5.3.18-24.107.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-24.107.1.aarch64", product: { name: "gfs2-kmp-default-5.3.18-24.107.1.aarch64", product_id: "gfs2-kmp-default-5.3.18-24.107.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-preempt-5.3.18-24.107.1.aarch64", product: { name: "gfs2-kmp-preempt-5.3.18-24.107.1.aarch64", product_id: "gfs2-kmp-preempt-5.3.18-24.107.1.aarch64", }, }, { category: "product_version", name: "kernel-default-5.3.18-24.107.1.aarch64", product: { name: "kernel-default-5.3.18-24.107.1.aarch64", product_id: "kernel-default-5.3.18-24.107.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", product: { name: "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", product_id: "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.aarch64", product: { name: "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.aarch64", product_id: "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-24.107.1.aarch64", product: { name: "kernel-default-devel-5.3.18-24.107.1.aarch64", product_id: "kernel-default-devel-5.3.18-24.107.1.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-24.107.1.aarch64", product: { name: "kernel-default-extra-5.3.18-24.107.1.aarch64", product_id: "kernel-default-extra-5.3.18-24.107.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-24.107.1.aarch64", product: { name: "kernel-default-livepatch-5.3.18-24.107.1.aarch64", product_id: "kernel-default-livepatch-5.3.18-24.107.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-24.107.1.aarch64", product: { name: "kernel-default-livepatch-devel-5.3.18-24.107.1.aarch64", product_id: "kernel-default-livepatch-devel-5.3.18-24.107.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-24.107.1.aarch64", product: { name: "kernel-obs-build-5.3.18-24.107.1.aarch64", product_id: "kernel-obs-build-5.3.18-24.107.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-24.107.1.aarch64", product: { name: "kernel-obs-qa-5.3.18-24.107.1.aarch64", product_id: "kernel-obs-qa-5.3.18-24.107.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-5.3.18-24.107.1.aarch64", product: { name: "kernel-preempt-5.3.18-24.107.1.aarch64", product_id: "kernel-preempt-5.3.18-24.107.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-devel-5.3.18-24.107.1.aarch64", product: { name: "kernel-preempt-devel-5.3.18-24.107.1.aarch64", product_id: "kernel-preempt-devel-5.3.18-24.107.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-extra-5.3.18-24.107.1.aarch64", product: { name: "kernel-preempt-extra-5.3.18-24.107.1.aarch64", product_id: "kernel-preempt-extra-5.3.18-24.107.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-livepatch-devel-5.3.18-24.107.1.aarch64", product: { name: "kernel-preempt-livepatch-devel-5.3.18-24.107.1.aarch64", product_id: "kernel-preempt-livepatch-devel-5.3.18-24.107.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-5.3.18-24.107.1.aarch64", product: { name: "kernel-syms-5.3.18-24.107.1.aarch64", product_id: "kernel-syms-5.3.18-24.107.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-24.107.1.aarch64", product: { name: "kselftests-kmp-default-5.3.18-24.107.1.aarch64", product_id: "kselftests-kmp-default-5.3.18-24.107.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-preempt-5.3.18-24.107.1.aarch64", product: { name: "kselftests-kmp-preempt-5.3.18-24.107.1.aarch64", product_id: "kselftests-kmp-preempt-5.3.18-24.107.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-24.107.1.aarch64", product: { name: "ocfs2-kmp-default-5.3.18-24.107.1.aarch64", product_id: "ocfs2-kmp-default-5.3.18-24.107.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-preempt-5.3.18-24.107.1.aarch64", product: { name: "ocfs2-kmp-preempt-5.3.18-24.107.1.aarch64", product_id: "ocfs2-kmp-preempt-5.3.18-24.107.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-24.107.1.aarch64", product: { name: "reiserfs-kmp-default-5.3.18-24.107.1.aarch64", product_id: "reiserfs-kmp-default-5.3.18-24.107.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-preempt-5.3.18-24.107.1.aarch64", product: { name: "reiserfs-kmp-preempt-5.3.18-24.107.1.aarch64", product_id: "reiserfs-kmp-preempt-5.3.18-24.107.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-5.3.18-24.107.1.noarch", product: { name: "kernel-devel-5.3.18-24.107.1.noarch", product_id: "kernel-devel-5.3.18-24.107.1.noarch", }, }, { category: "product_version", name: "kernel-docs-5.3.18-24.107.1.noarch", product: { name: "kernel-docs-5.3.18-24.107.1.noarch", product_id: "kernel-docs-5.3.18-24.107.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-5.3.18-24.107.1.noarch", product: { name: "kernel-docs-html-5.3.18-24.107.1.noarch", product_id: "kernel-docs-html-5.3.18-24.107.1.noarch", }, }, { category: "product_version", name: "kernel-macros-5.3.18-24.107.1.noarch", product: { name: "kernel-macros-5.3.18-24.107.1.noarch", product_id: "kernel-macros-5.3.18-24.107.1.noarch", }, }, { category: "product_version", name: "kernel-source-5.3.18-24.107.1.noarch", product: { name: "kernel-source-5.3.18-24.107.1.noarch", product_id: "kernel-source-5.3.18-24.107.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-5.3.18-24.107.1.noarch", product: { name: "kernel-source-vanilla-5.3.18-24.107.1.noarch", product_id: "kernel-source-vanilla-5.3.18-24.107.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", product: { name: "cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", product_id: "cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-24.107.1.ppc64le", product: { name: "dlm-kmp-default-5.3.18-24.107.1.ppc64le", product_id: "dlm-kmp-default-5.3.18-24.107.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-24.107.1.ppc64le", product: { name: "gfs2-kmp-default-5.3.18-24.107.1.ppc64le", product_id: "gfs2-kmp-default-5.3.18-24.107.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-5.3.18-24.107.1.ppc64le", product: { name: "kernel-debug-5.3.18-24.107.1.ppc64le", product_id: "kernel-debug-5.3.18-24.107.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-5.3.18-24.107.1.ppc64le", product: { name: "kernel-debug-devel-5.3.18-24.107.1.ppc64le", product_id: "kernel-debug-devel-5.3.18-24.107.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.3.18-24.107.1.ppc64le", product: { name: "kernel-debug-livepatch-devel-5.3.18-24.107.1.ppc64le", product_id: "kernel-debug-livepatch-devel-5.3.18-24.107.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-5.3.18-24.107.1.ppc64le", product: { name: "kernel-default-5.3.18-24.107.1.ppc64le", product_id: "kernel-default-5.3.18-24.107.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", product: { name: "kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", product_id: "kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.ppc64le", product: { name: "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.ppc64le", product_id: "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-24.107.1.ppc64le", product: { name: "kernel-default-devel-5.3.18-24.107.1.ppc64le", product_id: "kernel-default-devel-5.3.18-24.107.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-24.107.1.ppc64le", product: { name: "kernel-default-extra-5.3.18-24.107.1.ppc64le", product_id: "kernel-default-extra-5.3.18-24.107.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-24.107.1.ppc64le", product: { name: "kernel-default-livepatch-5.3.18-24.107.1.ppc64le", product_id: "kernel-default-livepatch-5.3.18-24.107.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", product: { name: "kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", product_id: "kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-5.3.18-24.107.1.ppc64le", product: { name: "kernel-kvmsmall-5.3.18-24.107.1.ppc64le", product_id: "kernel-kvmsmall-5.3.18-24.107.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.3.18-24.107.1.ppc64le", product: { name: "kernel-kvmsmall-devel-5.3.18-24.107.1.ppc64le", product_id: "kernel-kvmsmall-devel-5.3.18-24.107.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.3.18-24.107.1.ppc64le", product: { name: "kernel-kvmsmall-livepatch-devel-5.3.18-24.107.1.ppc64le", product_id: "kernel-kvmsmall-livepatch-devel-5.3.18-24.107.1.ppc64le", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", product: { name: "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", product_id: "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-24.107.1.ppc64le", product: { name: "kernel-obs-build-5.3.18-24.107.1.ppc64le", product_id: "kernel-obs-build-5.3.18-24.107.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-24.107.1.ppc64le", product: { name: "kernel-obs-qa-5.3.18-24.107.1.ppc64le", product_id: "kernel-obs-qa-5.3.18-24.107.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-5.3.18-24.107.1.ppc64le", product: { name: "kernel-syms-5.3.18-24.107.1.ppc64le", product_id: "kernel-syms-5.3.18-24.107.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-24.107.1.ppc64le", product: { name: "kselftests-kmp-default-5.3.18-24.107.1.ppc64le", product_id: "kselftests-kmp-default-5.3.18-24.107.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", product: { name: "ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", product_id: "ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", product: { name: "reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", product_id: "reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-24.107.1.s390x", product: { name: "cluster-md-kmp-default-5.3.18-24.107.1.s390x", product_id: "cluster-md-kmp-default-5.3.18-24.107.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-24.107.1.s390x", product: { name: "dlm-kmp-default-5.3.18-24.107.1.s390x", product_id: "dlm-kmp-default-5.3.18-24.107.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-24.107.1.s390x", product: { name: "gfs2-kmp-default-5.3.18-24.107.1.s390x", product_id: "gfs2-kmp-default-5.3.18-24.107.1.s390x", }, }, { category: "product_version", name: "kernel-default-5.3.18-24.107.1.s390x", product: { name: "kernel-default-5.3.18-24.107.1.s390x", product_id: "kernel-default-5.3.18-24.107.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", product: { name: "kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", product_id: "kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.s390x", product: { name: "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.s390x", product_id: "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.s390x", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-24.107.1.s390x", product: { name: "kernel-default-devel-5.3.18-24.107.1.s390x", product_id: "kernel-default-devel-5.3.18-24.107.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-24.107.1.s390x", product: { name: "kernel-default-extra-5.3.18-24.107.1.s390x", product_id: "kernel-default-extra-5.3.18-24.107.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-24.107.1.s390x", product: { name: "kernel-default-livepatch-5.3.18-24.107.1.s390x", product_id: "kernel-default-livepatch-5.3.18-24.107.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", product: { name: "kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", product_id: "kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", product: { name: "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", product_id: "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-24.107.1.s390x", product: { name: "kernel-obs-build-5.3.18-24.107.1.s390x", product_id: "kernel-obs-build-5.3.18-24.107.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-24.107.1.s390x", product: { name: "kernel-obs-qa-5.3.18-24.107.1.s390x", product_id: "kernel-obs-qa-5.3.18-24.107.1.s390x", }, }, { category: "product_version", name: "kernel-syms-5.3.18-24.107.1.s390x", product: { name: "kernel-syms-5.3.18-24.107.1.s390x", product_id: "kernel-syms-5.3.18-24.107.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-5.3.18-24.107.1.s390x", product: { name: "kernel-zfcpdump-5.3.18-24.107.1.s390x", product_id: "kernel-zfcpdump-5.3.18-24.107.1.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-24.107.1.s390x", product: { name: "kselftests-kmp-default-5.3.18-24.107.1.s390x", product_id: "kselftests-kmp-default-5.3.18-24.107.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-24.107.1.s390x", product: { name: "ocfs2-kmp-default-5.3.18-24.107.1.s390x", product_id: "ocfs2-kmp-default-5.3.18-24.107.1.s390x", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-24.107.1.s390x", product: { name: "reiserfs-kmp-default-5.3.18-24.107.1.s390x", product_id: "reiserfs-kmp-default-5.3.18-24.107.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-24.107.1.x86_64", product: { name: "cluster-md-kmp-default-5.3.18-24.107.1.x86_64", product_id: "cluster-md-kmp-default-5.3.18-24.107.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-preempt-5.3.18-24.107.1.x86_64", product: { name: "cluster-md-kmp-preempt-5.3.18-24.107.1.x86_64", product_id: "cluster-md-kmp-preempt-5.3.18-24.107.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-24.107.1.x86_64", product: { name: "dlm-kmp-default-5.3.18-24.107.1.x86_64", product_id: "dlm-kmp-default-5.3.18-24.107.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-preempt-5.3.18-24.107.1.x86_64", product: { name: "dlm-kmp-preempt-5.3.18-24.107.1.x86_64", product_id: "dlm-kmp-preempt-5.3.18-24.107.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-24.107.1.x86_64", product: { name: "gfs2-kmp-default-5.3.18-24.107.1.x86_64", product_id: "gfs2-kmp-default-5.3.18-24.107.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-preempt-5.3.18-24.107.1.x86_64", product: { name: "gfs2-kmp-preempt-5.3.18-24.107.1.x86_64", product_id: "gfs2-kmp-preempt-5.3.18-24.107.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-5.3.18-24.107.1.x86_64", product: { name: "kernel-debug-5.3.18-24.107.1.x86_64", product_id: "kernel-debug-5.3.18-24.107.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-5.3.18-24.107.1.x86_64", product: { name: "kernel-debug-devel-5.3.18-24.107.1.x86_64", product_id: "kernel-debug-devel-5.3.18-24.107.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.3.18-24.107.1.x86_64", product: { name: "kernel-debug-livepatch-devel-5.3.18-24.107.1.x86_64", product_id: "kernel-debug-livepatch-devel-5.3.18-24.107.1.x86_64", }, }, { category: "product_version", name: "kernel-default-5.3.18-24.107.1.x86_64", product: { name: "kernel-default-5.3.18-24.107.1.x86_64", product_id: "kernel-default-5.3.18-24.107.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", product: { name: "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", product_id: "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.x86_64", product: { name: "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.x86_64", product_id: "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-24.107.1.x86_64", product: { name: "kernel-default-devel-5.3.18-24.107.1.x86_64", product_id: "kernel-default-devel-5.3.18-24.107.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-24.107.1.x86_64", product: { name: "kernel-default-extra-5.3.18-24.107.1.x86_64", product_id: "kernel-default-extra-5.3.18-24.107.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-24.107.1.x86_64", product: { name: "kernel-default-livepatch-5.3.18-24.107.1.x86_64", product_id: "kernel-default-livepatch-5.3.18-24.107.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", product: { name: "kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", product_id: "kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-5.3.18-24.107.1.x86_64", product: { name: "kernel-kvmsmall-5.3.18-24.107.1.x86_64", product_id: "kernel-kvmsmall-5.3.18-24.107.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.3.18-24.107.1.x86_64", product: { name: "kernel-kvmsmall-devel-5.3.18-24.107.1.x86_64", product_id: "kernel-kvmsmall-devel-5.3.18-24.107.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.3.18-24.107.1.x86_64", product: { name: "kernel-kvmsmall-livepatch-devel-5.3.18-24.107.1.x86_64", product_id: "kernel-kvmsmall-livepatch-devel-5.3.18-24.107.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", product: { name: "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", product_id: "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-24_107-preempt-1-5.5.1.x86_64", product: { name: "kernel-livepatch-5_3_18-24_107-preempt-1-5.5.1.x86_64", product_id: "kernel-livepatch-5_3_18-24_107-preempt-1-5.5.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-24.107.1.x86_64", product: { name: "kernel-obs-build-5.3.18-24.107.1.x86_64", product_id: "kernel-obs-build-5.3.18-24.107.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-24.107.1.x86_64", product: { name: "kernel-obs-qa-5.3.18-24.107.1.x86_64", product_id: "kernel-obs-qa-5.3.18-24.107.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-5.3.18-24.107.1.x86_64", product: { name: "kernel-preempt-5.3.18-24.107.1.x86_64", product_id: "kernel-preempt-5.3.18-24.107.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-devel-5.3.18-24.107.1.x86_64", product: { name: "kernel-preempt-devel-5.3.18-24.107.1.x86_64", product_id: "kernel-preempt-devel-5.3.18-24.107.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-extra-5.3.18-24.107.1.x86_64", product: { name: "kernel-preempt-extra-5.3.18-24.107.1.x86_64", product_id: "kernel-preempt-extra-5.3.18-24.107.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-livepatch-devel-5.3.18-24.107.1.x86_64", product: { name: "kernel-preempt-livepatch-devel-5.3.18-24.107.1.x86_64", product_id: "kernel-preempt-livepatch-devel-5.3.18-24.107.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-5.3.18-24.107.1.x86_64", product: { name: "kernel-syms-5.3.18-24.107.1.x86_64", product_id: "kernel-syms-5.3.18-24.107.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-24.107.1.x86_64", product: { name: "kselftests-kmp-default-5.3.18-24.107.1.x86_64", product_id: "kselftests-kmp-default-5.3.18-24.107.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-preempt-5.3.18-24.107.1.x86_64", product: { name: "kselftests-kmp-preempt-5.3.18-24.107.1.x86_64", product_id: "kselftests-kmp-preempt-5.3.18-24.107.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-24.107.1.x86_64", product: { name: "ocfs2-kmp-default-5.3.18-24.107.1.x86_64", product_id: "ocfs2-kmp-default-5.3.18-24.107.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-preempt-5.3.18-24.107.1.x86_64", product: { name: "ocfs2-kmp-preempt-5.3.18-24.107.1.x86_64", product_id: "ocfs2-kmp-preempt-5.3.18-24.107.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-24.107.1.x86_64", product: { name: "reiserfs-kmp-default-5.3.18-24.107.1.x86_64", product_id: "reiserfs-kmp-default-5.3.18-24.107.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-preempt-5.3.18-24.107.1.x86_64", product: { name: "reiserfs-kmp-preempt-5.3.18-24.107.1.x86_64", product_id: "reiserfs-kmp-preempt-5.3.18-24.107.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP2", product: { name: "SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 15 SP2", product: { name: "SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Real Time 15 SP2", product: { name: "SUSE Linux Enterprise Real Time 15 SP2", product_id: "SUSE Linux Enterprise Real Time 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle_rt:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP2-BCL", product: { name: "SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles_bcl:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp2", }, }, }, { category: "product_name", name: "SUSE Manager Proxy 4.1", product: { name: "SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-proxy:4.1", }, }, }, { category: "product_name", name: "SUSE Manager Retail Branch Server 4.1", product: { name: "SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-retail-branch-server:4.1", }, }, }, { category: "product_name", name: "SUSE Manager Server 4.1", product: { name: "SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-server:4.1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Micro 5.0", product: { name: "SUSE Linux Enterprise Micro 5.0", product_id: "SUSE Linux Enterprise Micro 5.0", product_identification_helper: { cpe: "cpe:/o:suse:suse-microos:5.0", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 7", product: { name: "SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7", product_identification_helper: { cpe: "cpe:/o:suse:ses:7", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", }, product_reference: "kernel-default-livepatch-5.3.18-24.107.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-24.107.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", }, product_reference: "kernel-default-livepatch-5.3.18-24.107.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-default-livepatch-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", }, product_reference: "kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-24.107.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", }, product_reference: "kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", }, product_reference: "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", }, product_reference: "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", }, product_reference: "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", }, product_reference: "cluster-md-kmp-default-5.3.18-24.107.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", }, product_reference: "cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-24.107.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", }, product_reference: "cluster-md-kmp-default-5.3.18-24.107.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", }, product_reference: "cluster-md-kmp-default-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", }, product_reference: "dlm-kmp-default-5.3.18-24.107.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", }, product_reference: "dlm-kmp-default-5.3.18-24.107.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-24.107.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", }, product_reference: "dlm-kmp-default-5.3.18-24.107.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", }, product_reference: "dlm-kmp-default-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", }, product_reference: "gfs2-kmp-default-5.3.18-24.107.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", }, product_reference: "gfs2-kmp-default-5.3.18-24.107.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-24.107.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", }, product_reference: "gfs2-kmp-default-5.3.18-24.107.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", }, product_reference: "gfs2-kmp-default-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", }, product_reference: "ocfs2-kmp-default-5.3.18-24.107.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", }, product_reference: "ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-24.107.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", }, product_reference: "ocfs2-kmp-default-5.3.18-24.107.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", }, product_reference: "ocfs2-kmp-default-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", }, product_reference: "kernel-default-5.3.18-24.107.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-default-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", }, product_reference: "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", }, product_reference: "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", }, product_reference: "kernel-default-devel-5.3.18-24.107.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", }, product_reference: "kernel-devel-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", }, product_reference: "kernel-docs-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", }, product_reference: "kernel-macros-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", }, product_reference: "kernel-obs-build-5.3.18-24.107.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", }, product_reference: "kernel-preempt-5.3.18-24.107.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", }, product_reference: "kernel-preempt-devel-5.3.18-24.107.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", }, product_reference: "kernel-source-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", }, product_reference: "kernel-syms-5.3.18-24.107.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-syms-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", }, product_reference: "kernel-default-5.3.18-24.107.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-default-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", }, product_reference: "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", }, product_reference: "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", }, product_reference: "kernel-default-devel-5.3.18-24.107.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", }, product_reference: "kernel-devel-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", }, product_reference: "kernel-docs-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", }, product_reference: "kernel-macros-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", }, product_reference: "kernel-obs-build-5.3.18-24.107.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", }, product_reference: "kernel-preempt-5.3.18-24.107.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", }, product_reference: "kernel-preempt-devel-5.3.18-24.107.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", }, product_reference: "kernel-source-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", }, product_reference: "kernel-syms-5.3.18-24.107.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-syms-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", product_id: "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-default-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", product_id: "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", }, product_reference: "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", product_id: "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Real Time 15 SP2", product_id: "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", }, product_reference: "kernel-devel-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Real Time 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Real Time 15 SP2", product_id: "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", }, product_reference: "kernel-docs-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Real Time 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Real Time 15 SP2", product_id: "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", }, product_reference: "kernel-macros-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Real Time 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", product_id: "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", product_id: "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", product_id: "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Real Time 15 SP2", product_id: "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", }, product_reference: "kernel-source-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Real Time 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", product_id: "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-syms-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-default-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", }, product_reference: "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", }, product_reference: "kernel-devel-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", }, product_reference: "kernel-docs-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", }, product_reference: "kernel-macros-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", }, product_reference: "kernel-source-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-syms-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", }, product_reference: "kernel-default-5.3.18-24.107.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", }, product_reference: "kernel-default-5.3.18-24.107.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-24.107.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", }, product_reference: "kernel-default-5.3.18-24.107.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-default-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", }, product_reference: "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", }, product_reference: "kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-24.107.1.9.50.2.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", }, product_reference: "kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", }, product_reference: "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", }, product_reference: "kernel-default-devel-5.3.18-24.107.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", }, product_reference: "kernel-default-devel-5.3.18-24.107.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-24.107.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", }, product_reference: "kernel-default-devel-5.3.18-24.107.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", }, product_reference: "kernel-devel-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", }, product_reference: "kernel-docs-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", }, product_reference: "kernel-macros-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", }, product_reference: "kernel-obs-build-5.3.18-24.107.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", }, product_reference: "kernel-obs-build-5.3.18-24.107.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-24.107.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", }, product_reference: "kernel-obs-build-5.3.18-24.107.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", }, product_reference: "kernel-preempt-5.3.18-24.107.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", }, product_reference: "kernel-preempt-devel-5.3.18-24.107.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", }, product_reference: "kernel-source-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", }, product_reference: "kernel-syms-5.3.18-24.107.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", }, product_reference: "kernel-syms-5.3.18-24.107.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-24.107.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", }, product_reference: "kernel-syms-5.3.18-24.107.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-syms-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", }, product_reference: "reiserfs-kmp-default-5.3.18-24.107.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", }, product_reference: "reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-24.107.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", }, product_reference: "reiserfs-kmp-default-5.3.18-24.107.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", }, product_reference: "kernel-default-5.3.18-24.107.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-default-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", }, product_reference: "kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", }, product_reference: "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", }, product_reference: "kernel-default-devel-5.3.18-24.107.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", }, product_reference: "kernel-devel-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", }, product_reference: "kernel-docs-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", }, product_reference: "kernel-macros-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", }, product_reference: "kernel-obs-build-5.3.18-24.107.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", }, product_reference: "kernel-source-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", }, product_reference: "kernel-syms-5.3.18-24.107.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-syms-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", }, product_reference: "reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-24.107.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-default-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", }, product_reference: "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-24.107.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-24.107.1.noarch as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", }, product_reference: "kernel-devel-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-24.107.1.noarch as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", }, product_reference: "kernel-docs-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-24.107.1.noarch as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", }, product_reference: "kernel-macros-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-24.107.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-24.107.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-24.107.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-24.107.1.noarch as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", }, product_reference: "kernel-source-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-24.107.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-syms-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-24.107.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-24.107.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-default-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", }, product_reference: "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-24.107.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-24.107.1.noarch as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", }, product_reference: "kernel-devel-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-24.107.1.noarch as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", }, product_reference: "kernel-docs-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-24.107.1.noarch as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", }, product_reference: "kernel-macros-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-24.107.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-24.107.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-24.107.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-24.107.1.noarch as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", }, product_reference: "kernel-source-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-24.107.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-syms-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-24.107.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-24.107.1.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", }, product_reference: "kernel-default-5.3.18-24.107.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-24.107.1.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", }, product_reference: "kernel-default-5.3.18-24.107.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-24.107.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-default-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", }, product_reference: "kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-24.107.1.9.50.2.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", }, product_reference: "kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", }, product_reference: "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-24.107.1.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", }, product_reference: "kernel-default-devel-5.3.18-24.107.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-24.107.1.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", }, product_reference: "kernel-default-devel-5.3.18-24.107.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-24.107.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-24.107.1.noarch as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", }, product_reference: "kernel-devel-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-24.107.1.noarch as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", }, product_reference: "kernel-docs-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-24.107.1.noarch as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", }, product_reference: "kernel-macros-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-24.107.1.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", }, product_reference: "kernel-obs-build-5.3.18-24.107.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-24.107.1.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", }, product_reference: "kernel-obs-build-5.3.18-24.107.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-24.107.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-24.107.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-24.107.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-24.107.1.noarch as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", }, product_reference: "kernel-source-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-24.107.1.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", }, product_reference: "kernel-syms-5.3.18-24.107.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-24.107.1.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", }, product_reference: "kernel-syms-5.3.18-24.107.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-24.107.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-syms-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-24.107.1.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", }, product_reference: "reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-24.107.1.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", }, product_reference: "reiserfs-kmp-default-5.3.18-24.107.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-24.107.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise Micro 5.0", product_id: "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", }, product_reference: "kernel-default-5.3.18-24.107.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.0", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Micro 5.0", product_id: "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-default-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.0", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64 as component of SUSE Linux Enterprise Micro 5.0", product_id: "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", }, product_reference: "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.0", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64 as component of SUSE Linux Enterprise Micro 5.0", product_id: "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", }, product_reference: "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.0", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-24.107.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", }, product_reference: "kernel-default-5.3.18-24.107.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-24.107.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-default-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", }, product_reference: "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", }, product_reference: "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-24.107.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", }, product_reference: "kernel-default-devel-5.3.18-24.107.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-24.107.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-24.107.1.noarch as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", }, product_reference: "kernel-devel-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-24.107.1.noarch as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", }, product_reference: "kernel-docs-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-24.107.1.noarch as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", }, product_reference: "kernel-macros-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-24.107.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", }, product_reference: "kernel-obs-build-5.3.18-24.107.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-24.107.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-24.107.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", }, product_reference: "kernel-preempt-5.3.18-24.107.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-24.107.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-24.107.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", }, product_reference: "kernel-preempt-devel-5.3.18-24.107.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-24.107.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-24.107.1.noarch as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", }, product_reference: "kernel-source-5.3.18-24.107.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-24.107.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", }, product_reference: "kernel-syms-5.3.18-24.107.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-24.107.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", }, product_reference: "kernel-syms-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-24.107.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", }, product_reference: "reiserfs-kmp-default-5.3.18-24.107.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-24.107.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.3.18-24.107.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, ], }, vulnerabilities: [ { cve: "CVE-2021-44879", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-44879", }, ], notes: [ { category: "general", text: "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-44879", url: "https://www.suse.com/security/cve/CVE-2021-44879", }, { category: "external", summary: "SUSE Bug 1195987 for CVE-2021-44879", url: "https://bugzilla.suse.com/1195987", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-08T18:06:15Z", details: "moderate", }, ], title: "CVE-2021-44879", }, { cve: "CVE-2022-0001", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0001", }, ], notes: [ { category: "general", text: "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0001", url: "https://www.suse.com/security/cve/CVE-2022-0001", }, { category: "external", summary: "SUSE Bug 1191580 for CVE-2022-0001", url: "https://bugzilla.suse.com/1191580", }, { category: "external", summary: "SUSE Bug 1196901 for CVE-2022-0001", url: "https://bugzilla.suse.com/1196901", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-08T18:06:15Z", details: "moderate", }, ], title: "CVE-2022-0001", }, { cve: "CVE-2022-0002", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0002", }, ], notes: [ { category: "general", text: "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0002", url: "https://www.suse.com/security/cve/CVE-2022-0002", }, { category: "external", summary: "SUSE Bug 1191580 for CVE-2022-0002", url: "https://bugzilla.suse.com/1191580", }, { category: "external", summary: "SUSE Bug 1196901 for CVE-2022-0002", url: "https://bugzilla.suse.com/1196901", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-08T18:06:15Z", details: "moderate", }, ], title: "CVE-2022-0002", }, { cve: "CVE-2022-0487", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0487", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0487", url: "https://www.suse.com/security/cve/CVE-2022-0487", }, { category: "external", summary: "SUSE Bug 1194516 for CVE-2022-0487", url: "https://bugzilla.suse.com/1194516", }, { category: "external", summary: "SUSE Bug 1195949 for CVE-2022-0487", url: "https://bugzilla.suse.com/1195949", }, { category: "external", summary: "SUSE Bug 1198615 for CVE-2022-0487", url: "https://bugzilla.suse.com/1198615", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-08T18:06:15Z", details: "moderate", }, ], title: "CVE-2022-0487", }, { cve: "CVE-2022-0492", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0492", }, ], notes: [ { category: "general", text: "A vulnerability was found in the Linux kernel's cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0492", url: "https://www.suse.com/security/cve/CVE-2022-0492", }, { category: "external", summary: "SUSE Bug 1195543 for CVE-2022-0492", url: "https://bugzilla.suse.com/1195543", }, { category: "external", summary: "SUSE Bug 1195908 for CVE-2022-0492", url: "https://bugzilla.suse.com/1195908", }, { category: "external", summary: "SUSE Bug 1196612 for CVE-2022-0492", url: "https://bugzilla.suse.com/1196612", }, { category: "external", summary: "SUSE Bug 1196776 for CVE-2022-0492", url: "https://bugzilla.suse.com/1196776", }, { category: "external", summary: "SUSE Bug 1198615 for CVE-2022-0492", url: "https://bugzilla.suse.com/1198615", }, { category: "external", summary: "SUSE Bug 1199255 for CVE-2022-0492", url: "https://bugzilla.suse.com/1199255", }, { category: "external", summary: "SUSE Bug 1199615 for CVE-2022-0492", url: "https://bugzilla.suse.com/1199615", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2022-0492", url: "https://bugzilla.suse.com/1200084", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-08T18:06:15Z", details: "moderate", }, ], title: "CVE-2022-0492", }, { cve: "CVE-2022-0516", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0516", }, ], notes: [ { category: "general", text: "A vulnerability was found in kvm_s390_guest_sida_op in the arch/s390/kvm/kvm-s390.c function in KVM for s390 in the Linux kernel. This flaw allows a local attacker with a normal user privilege to obtain unauthorized memory write access. This flaw affects Linux kernel versions prior to 5.17-rc4.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0516", url: "https://www.suse.com/security/cve/CVE-2022-0516", }, { category: "external", summary: "SUSE Bug 1195516 for CVE-2022-0516", url: "https://bugzilla.suse.com/1195516", }, { category: "external", summary: "SUSE Bug 1195947 for CVE-2022-0516", url: "https://bugzilla.suse.com/1195947", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-08T18:06:15Z", details: "important", }, ], title: "CVE-2022-0516", }, { cve: "CVE-2022-0617", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0617", }, ], notes: [ { category: "general", text: "A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0617", url: "https://www.suse.com/security/cve/CVE-2022-0617", }, { category: "external", summary: "SUSE Bug 1196079 for CVE-2022-0617", url: "https://bugzilla.suse.com/1196079", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-08T18:06:15Z", details: "moderate", }, ], title: "CVE-2022-0617", }, { cve: "CVE-2022-0644", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0644", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0644", url: "https://www.suse.com/security/cve/CVE-2022-0644", }, { category: "external", summary: "SUSE Bug 1196155 for CVE-2022-0644", url: "https://bugzilla.suse.com/1196155", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-08T18:06:15Z", details: "moderate", }, ], title: "CVE-2022-0644", }, { cve: "CVE-2022-0847", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0847", }, ], notes: [ { category: "general", text: "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0847", url: "https://www.suse.com/security/cve/CVE-2022-0847", }, { category: "external", summary: "SUSE Bug 1196584 for CVE-2022-0847", url: "https://bugzilla.suse.com/1196584", }, { category: "external", summary: "SUSE Bug 1196601 for CVE-2022-0847", url: "https://bugzilla.suse.com/1196601", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-08T18:06:15Z", details: "important", }, ], title: "CVE-2022-0847", }, { cve: "CVE-2022-24448", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-24448", }, ], notes: [ { category: "general", text: "An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-24448", url: "https://www.suse.com/security/cve/CVE-2022-24448", }, { category: "external", summary: "SUSE Bug 1195612 for CVE-2022-24448", url: "https://bugzilla.suse.com/1195612", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-08T18:06:15Z", details: "moderate", }, ], title: "CVE-2022-24448", }, { cve: "CVE-2022-24958", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-24958", }, ], notes: [ { category: "general", text: "drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev->buf release.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-24958", url: "https://www.suse.com/security/cve/CVE-2022-24958", }, { category: "external", summary: "SUSE Bug 1195905 for CVE-2022-24958", url: "https://bugzilla.suse.com/1195905", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-08T18:06:15Z", details: "moderate", }, ], title: "CVE-2022-24958", }, { cve: "CVE-2022-24959", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-24959", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-24959", url: "https://www.suse.com/security/cve/CVE-2022-24959", }, { category: "external", summary: "SUSE Bug 1195897 for CVE-2022-24959", url: "https://bugzilla.suse.com/1195897", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-08T18:06:15Z", details: "moderate", }, ], title: "CVE-2022-24959", }, { cve: "CVE-2022-25258", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-25258", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-25258", url: "https://www.suse.com/security/cve/CVE-2022-25258", }, { category: "external", summary: "SUSE Bug 1196095 for CVE-2022-25258", url: "https://bugzilla.suse.com/1196095", }, { category: "external", summary: "SUSE Bug 1196132 for CVE-2022-25258", url: "https://bugzilla.suse.com/1196132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-08T18:06:15Z", details: "important", }, ], title: "CVE-2022-25258", }, { cve: "CVE-2022-25375", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-25375", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/usb/gadget/function/rndis.c in the Linux kernel before 5.16.10. The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-25375", url: "https://www.suse.com/security/cve/CVE-2022-25375", }, { category: "external", summary: "SUSE Bug 1196235 for CVE-2022-25375", url: "https://bugzilla.suse.com/1196235", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-08T18:06:15Z", details: "moderate", }, ], title: "CVE-2022-25375", }, ], }
suse-su-2022:1039-1
Vulnerability from csaf_suse
Published
2022-03-30 07:38
Modified
2022-03-30 07:38
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-25636: Fixed an issue which allowed a local users to gain privileges because of a heap out-of-bounds write in nf_dup_netdev.c, related to nf_tables_offload (bsc#1196299).
- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could trigger crash the system or corrupt system memory (bsc#1196830).
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-24448: Fixed an issue if an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd(). (bsc#1196155)
- CVE-2022-25258: The USB Gadget subsystem lacked certain validation of interface OS descriptor requests, which could have lead to memory corruption (bsc#1196096).
- CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev->buf release (bsc#1195905).
- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free vulnerability in unix_scm_to_skb of af_unix (bsc#1193731).
- CVE-2021-39657: Fixed an information leak in the Universal Flash Storage subsystem (bsc#1193864).
- CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which allowed attackers to obtain sensitive information from heap memory via crafted frame lengths from a device (bsc#1196836).
- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)
- CVE-2021-45402: The check_alu_op function in kernel/bpf/verifier.c did not properly update bounds while handling the mov32 instruction, which allowed local users to obtain potentially sensitive address information (bsc#1196130).
- CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers. (bsc#1196488)
The following non-security bugs were fixed:
- ALSA: intel_hdmi: Fix reference to PCM buffer address (git-fixes).
- ARM: 9182/1: mmu: fix returns from early_param() and __setup() functions (git-fixes).
- ARM: Fix kgdb breakpoint for Thumb2 (git-fixes).
- ASoC: cs4265: Fix the duplicated control name (git-fixes).
- ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min (git-fixes).
- ASoC: rt5668: do not block workqueue if card is unbound (git-fixes).
- ASoC: rt5682: do not block workqueue if card is unbound (git-fixes).
- Bluetooth: btusb: Add missing Chicony device for Realtek RTL8723BE (bsc#1196779).
- EDAC/altera: Fix deferred probing (bsc#1178134).
- EDAC: Fix calculation of returned address and next offset in edac_align_ptr() (bsc#1178134).
- HID: add mapping for KEY_ALL_APPLICATIONS (git-fixes).
- HID: add mapping for KEY_DICTATE (git-fixes).
- Hand over the maintainership to SLE15-SP3 maintainers
- IB/hfi1: Correct guard on eager buffer deallocation (git-fixes).
- IB/hfi1: Fix early init panic (git-fixes).
- IB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr (git-fixes).
- IB/hfi1: Insure use of smp_processor_id() is preempt disabled (git-fixes).
- IB/rdmavt: Validate remote_addr during loopback atomic tests (git-fixes).
- Input: clear BTN_RIGHT/MIDDLE on buttonpads (git-fixes).
- Input: elan_i2c - fix regulator enable count imbalance after suspend/resume (git-fixes).
- Input: elan_i2c - move regulator_[en|dis]able() out of elan_[en|dis]able_power() (git-fixes).
- NFC: port100: fix use-after-free in port100_send_complete (git-fixes).
- RDMA/bnxt_re: Scan the whole bitmap when checking if 'disabling RCFW with pending cmd-bit' (git-fixes).
- RDMA/cma: Do not change route.addr.src_addr outside state checks (bsc#1181147).
- RDMA/cma: Let cma_resolve_ib_dev() continue search even after empty entry (git-fixes).
- RDMA/cma: Remove open coding of overflow checking for private_data_len (git-fixes).
- RDMA/core: Do not infoleak GRH fields (git-fixes).
- RDMA/core: Let ib_find_gid() continue search even after empty entry (git-fixes).
- RDMA/cxgb4: Set queue pair state when being queried (git-fixes).
- RDMA/hns: Validate the pkey index (git-fixes).
- RDMA/ib_srp: Fix a deadlock (git-fixes).
- RDMA/mlx4: Do not continue event handler after memory allocation failure (git-fixes).
- RDMA/rtrs-clt: Fix possible double free in error case (jsc#SLE-15176).
- RDMA/rxe: Fix a typo in opcode name (git-fixes).
- RDMA/siw: Fix broken RDMA Read Fence/Resume logic (git-fixes).
- RDMA/uverbs: Check for null return of kmalloc_array (git-fixes).
- RDMA/uverbs: Remove the unnecessary assignment (git-fixes).
- Revert 'USB: serial: ch341: add new Product ID for CH341A' (git-fixes).
- SUNRPC: avoid race between mod_timer() and del_timer_sync() (bnc#1195403).
- USB: gadget: validate endpoint index for xilinx udc (git-fixes).
- USB: gadget: validate interface OS descriptor requests (git-fixes).
- USB: hub: Clean up use of port initialization schemes and retries (git-fixes).
- USB: serial: option: add Telit LE910R1 compositions (git-fixes).
- USB: serial: option: add support for DW5829e (git-fixes).
- USB: zaurus: support another broken Zaurus (git-fixes).
- arm64: dts: rockchip: Switch RK3399-Gru DP to SPDIF output (git-fixes).
- asix: fix uninit-value in asix_mdio_read() (git-fixes).
- ata: pata_hpt37x: disable primary channel on HPT371 (git-fixes).
- ax25: Fix NULL pointer dereference in ax25_kill_by_device (git-fixes).
- batman-adv: Do not expect inter-netns unique iflink indices (git-fixes).
- batman-adv: Request iflink once in batadv-on-batadv check (git-fixes).
- batman-adv: Request iflink once in batadv_get_real_netdevice (git-fixes).
- blk-mq: do not free tags if the tag_set is used by other device in queue initialztion (bsc#1193787).
- bnxt_en: Fix active FEC reporting to ethtool (jsc#SLE-16649).
- bnxt_en: Fix incorrect multicast rx mask setting when not requested (git-fixes).
- bnxt_en: Fix occasional ethtool -t loopback test failures (git-fixes).
- bnxt_en: Fix offline ethtool selftest with RDMA enabled (git-fixes).
- bonding: force carrier update when releasing slave (git-fixes).
- build initrd without systemd This reduces the size of the initrd by over 25%, which improves startup time of the virtual machine by 0.5-0.6s on very fast machines, more on slower ones.
- can: gs_usb: change active_channels's type from atomic_t to u8 (git-fixes).
- cgroup-v1: Correct privileges check in release_agent writes (bsc#1196723).
- cgroup/cpuset: Fix 'suspicious RCU usage' lockdep warning (bsc#1196868).
- clk: jz4725b: fix mmc0 clock gating (git-fixes).
- constraints: Also adjust disk requirement for x86 and s390.
- constraints: Increase disk space for aarch64
- cpufreq: schedutil: Use kobject release() method to free (git-fixes)
- cpuset: Fix the bug that subpart_cpus updated wrongly in update_cpumask() (bsc#1196866).
- cputime, cpuacct: Include guest time in user time in (git-fixes)
- dma-direct: Fix potential NULL pointer dereference (bsc#1196472 ltc#192278).
- dma-mapping: Allow mixing bypass and mapped DMA operation (bsc#1196472 ltc#192278).
- dmaengine: shdma: Fix runtime PM imbalance on error (git-fixes).
- drm/amdgpu: disable MMHUB PG for Picasso (git-fixes).
- drm/edid: Always set RGB444 (git-fixes).
- drm/i915/dg1: Wait for pcode/uncore handshake at startup (bsc#1195211).
- drm/i915/gen11+: Only load DRAM information from pcode (bsc#1195211).
- drm/i915: Nuke not needed members of dram_info (bsc#1195211).
- drm/i915: Remove memory frequency calculation (bsc#1195211).
- drm/i915: Rename is_16gb_dimm to wm_lv_0_adjust_needed (bsc#1195211).
- drm/sun4i: mixer: Fix P010 and P210 format numbers (git-fixes).
- efivars: Respect 'block' flag in efivar_entry_set_safe() (git-fixes).
- exfat: fix i_blocks for files truncated over 4 GiB (git-fixes).
- exfat: fix incorrect loading of i_blocks for large files (git-fixes).
- firmware: arm_scmi: Remove space in MODULE_ALIAS name (git-fixes).
- fix rpm build warning tumbleweed rpm is adding these warnings to the log: It's not recommended to have unversioned Obsoletes: Obsoletes: microcode_ctl
- gianfar: ethtool: Fix refcount leak in gfar_get_ts_info (git-fixes).
- gpio: rockchip: Reset int_bothedge when changing trigger (git-fixes).
- gpio: tegra186: Fix chip_data type confusion (git-fixes).
- gpio: ts4900: Do not set DAT and OE together (git-fixes).
- gpiolib: acpi: Convert ACPI value of debounce to microseconds (git-fixes).
- gtp: remove useless rcu_read_lock() (git-fixes).
- hamradio: fix macro redefine warning (git-fixes).
- i2c: bcm2835: Avoid clock stretching timeouts (git-fixes).
- iavf: Fix missing check for running netdev (git-fixes).
- ice: initialize local variable 'tlv' (jsc#SLE-12878).
- igc: igc_read_phy_reg_gpy: drop premature return (git-fixes).
- igc: igc_write_phy_reg_gpy: drop premature return (git-fixes).
- iio: Fix error handling for PM (git-fixes).
- iio: adc: ad7124: fix mask used for setting AIN_BUFP & AIN_BUFM bits (git-fixes).
- iio: adc: men_z188_adc: Fix a resource leak in an error handling path (git-fixes).
- ixgbe: xsk: change !netif_carrier_ok() handling in ixgbe_xmit_zc() (git-fixes).
- kernel-binary.spec.in: Move 20-kernel-default-extra.conf to the correctr directory (bsc#1195051).
- kernel-binary.spec: Also exclude the kernel signing key from devel package. There is a check in OBS that fails when it is included. Also the key is not reproducible. Fixes: bb988d4625a3 ('kernel-binary: Do not include sourcedir in certificate path.')
- kernel-binary.spec: Do not use the default certificate path (bsc#1194943). Using the the default path is broken since Linux 5.17
- kernel-binary: Do not include sourcedir in certificate path. The certs macro runs before build directory is set up so it creates the aggregate of supplied certificates in the source directory. Using this file directly as the certificate in kernel config works but embeds the source directory path in the kernel config. To avoid this symlink the certificate to the build directory and use relative path to refer to it. Also fabricate a certificate in the same location in build directory when none is provided.
- kernel-obs-build: include 9p (boo#1195353) To be able to share files between host and the qemu vm of the build script, the 9p and 9p_virtio kernel modules need to be included in the initrd of kernel-obs-build.
- mac80211: fix forwarded mesh frames AC & queue selection (git-fixes).
- mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work (git-fixes).
- mac80211_hwsim: report NOACK frames in tx_status (git-fixes).
- mask out added spinlock in rndis_params (git-fixes).
- mmc: meson: Fix usage of meson_mmc_post_req() (git-fixes).
- net/mlx5: Fix possible deadlock on rule deletion (git-fixes).
- net/mlx5: Fix wrong limitation of metadata match on ecpf (git-fixes).
- net/mlx5: Update the list of the PCI supported devices (git-fixes).
- net/mlx5: Update the list of the PCI supported devices (git-fixes).
- net/mlx5e: Fix modify header actions memory leak (git-fixes).
- net/mlx5e: Fix page DMA map/unmap attributes (bsc#1196468).
- net/mlx5e: Fix wrong return value on ioctl EEPROM query failure (git-fixes).
- net/mlx5e: TC, Reject rules with drop and modify hdr action (git-fixes).
- net/mlx5e: TC, Reject rules with forward and drop actions (git-fixes).
- net/mlx5e: kTLS, Use CHECKSUM_UNNECESSARY for device-offloaded packets (jsc#SLE-15172).
- net/sched: act_ct: Fix flow table lookup after ct clear or switching zones (jsc#SLE-15172).
- net: dsa: mv88e6xxx: MV88E6097 does not support jumbo configuration (git-fixes).
- net: ethernet: ti: cpsw: disable PTPv1 hw timestamping advertisement (git-fixes).
- net: fix up skbs delta_truesize in UDP GRO frag_list (bsc#1176447).
- net: hns3: Clear the CMDQ registers before unmapping BAR region (git-fixes).
- net: phy: DP83822: clear MISR2 register to disable interrupts (git-fixes).
- net: sfc: Replace in_interrupt() usage (git-fixes).
- net: tipc: validate domain record count on input (bsc#1195254).
- net: usb: cdc_mbim: avoid altsetting toggling for Telit FN990 (git-fixes).
- netfilter: nf_tables: fix memory leak during stateful obj update (bsc#1176447).
- netsec: ignore 'phy-mode' device property on ACPI systems (git-fixes).
- nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() (git-fixes).
- nl80211: Handle nla_memdup failures in handle_nan_filter (git-fixes).
- ntb: intel: fix port config status offset for SPR (git-fixes).
- nvme-multipath: use vmalloc for ANA log buffer (bsc#1193787).
- nvme-rdma: fix possible use-after-free in transport error_recovery work (git-fixes).
- nvme-tcp: fix possible use-after-free in transport error_recovery work (git-fixes).
- nvme: fix a possible use-after-free in controller reset during load (git-fixes).
- powerpc/dma: Fallback to dma_ops when persistent memory present (bsc#1196472 ltc#192278). Update config files.
- powerpc/fadump: register for fadump as early as possible (bsc#1179439 ltc#190038).
- powerpc/mm: Remove dcache flush from memory remove (bsc#1196433 ltc#196449).
- powerpc/powernv/memtrace: Fix dcache flushing (bsc#1196433 ltc#196449).
- powerpc/pseries/iommu: Fix window size for direct mapping with pmem (bsc#1196472 ltc#192278).
- rpm/*.spec.in: Use https:// urls
- rpm/arch-symbols,guards,*driver: Replace Novell with SUSE.
- rpm/check-for-config-changes: Ignore PAHOLE_VERSION.
- rpm/kernel-docs.spec.in: use %%license for license declarations Limited to SLE15+ to avoid compatibility nightmares.
- rpm/kernel-source.spec.in: call fdupes per subpackage It is a waste of time to do a global fdupes when we have subpackages.
- rpm: SC2006: Use $(...) notation instead of legacy backticked `...`.
- sched/core: Mitigate race (git-fixes)
- scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() (git-fixes).
- scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe (git-fixes).
- scsi: lpfc: Terminate string in lpfc_debugfs_nvmeio_trc_write() (git-fixes).
- scsi: nsp_cs: Check of ioremap return value (git-fixes).
- scsi: qedf: Fix potential dereference of NULL pointer (git-fixes).
- scsi: smartpqi: Add PCI IDs (bsc#1196627).
- scsi: ufs: Fix race conditions related to driver data (git-fixes).
- selftests: mlxsw: tc_police_scale: Make test more robust (bsc#1176774).
- soc: fsl: Correct MAINTAINERS database (QUICC ENGINE LIBRARY) (git-fixes).
- soc: fsl: Correct MAINTAINERS database (SOC) (git-fixes).
- soc: fsl: qe: Check of ioremap return value (git-fixes).
- spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op() (git-fixes).
- sr9700: sanity check for packet length (bsc#1196836).
- staging: gdm724x: fix use after free in gdm_lte_rx() (git-fixes).
- tracing: Fix return value of __setup handlers (git-fixes).
- tty: n_gsm: fix encoding of control signal octet bit DV (git-fixes).
- tty: n_gsm: fix proper link termination after failed open (git-fixes).
- usb: dwc2: Fix Stalling a Non-Isochronous OUT EP (git-fixes).
- usb: dwc2: gadget: Fix GOUTNAK flow for Slave mode (git-fixes).
- usb: dwc2: gadget: Fix kill_all_requests race (git-fixes).
- usb: dwc2: use well defined macros for power_down (git-fixes).
- usb: dwc3: gadget: Let the interrupt handler disable bottom halves (git-fixes).
- usb: dwc3: meson-g12a: Disable the regulator in the error handling path of the probe (git-fixes).
- usb: dwc3: pci: Fix Bay Trail phy GPIO mappings (git-fixes).
- usb: gadget: rndis: add spinlock for rndis response list (git-fixes).
- usb: host: xen-hcd: add missing unlock in error path (git-fixes).
- usb: hub: Fix locking issues with address0_mutex (git-fixes).
- usb: hub: Fix usb enumeration issue due to address0 race (git-fixes).
- vrf: Fix fast path output packet handling with async Netfilter rules (git-fixes).
- xen/usb: do not use gnttab_end_foreign_access() in xenhcd_gnttab_done() (bsc#1196488, XSA-396).
- xhci: Prevent futile URB re-submissions due to incorrect return value (git-fixes).
- xhci: re-initialize the HC during resume if HCE was set (git-fixes).
Patchnames
SUSE-2022-1039,SUSE-SLE-Module-Basesystem-15-SP3-2022-1039,SUSE-SLE-Module-Development-Tools-15-SP3-2022-1039,SUSE-SLE-Module-Legacy-15-SP3-2022-1039,SUSE-SLE-Module-Live-Patching-15-SP3-2022-1039,SUSE-SLE-Product-HA-15-SP3-2022-1039,SUSE-SLE-Product-WE-15-SP3-2022-1039,SUSE-SUSE-MicroOS-5.1-2022-1039
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-25636: Fixed an issue which allowed a local users to gain privileges because of a heap out-of-bounds write in nf_dup_netdev.c, related to nf_tables_offload (bsc#1196299).\n- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could trigger crash the system or corrupt system memory (bsc#1196830).\n- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).\n- CVE-2022-24448: Fixed an issue if an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).\n- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)\n- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd(). (bsc#1196155)\n- CVE-2022-25258: The USB Gadget subsystem lacked certain validation of interface OS descriptor requests, which could have lead to memory corruption (bsc#1196096).\n- CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev->buf release (bsc#1195905).\n- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).\n- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).\n- CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free vulnerability in unix_scm_to_skb of af_unix (bsc#1193731).\n- CVE-2021-39657: Fixed an information leak in the Universal Flash Storage subsystem (bsc#1193864).\n- CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which allowed attackers to obtain sensitive information from heap memory via crafted frame lengths from a device (bsc#1196836).\n- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)\n- CVE-2021-45402: The check_alu_op function in kernel/bpf/verifier.c did not properly update bounds while handling the mov32 instruction, which allowed local users to obtain potentially sensitive address information (bsc#1196130).\n- CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers. (bsc#1196488)\n\nThe following non-security bugs were fixed:\n\n- ALSA: intel_hdmi: Fix reference to PCM buffer address (git-fixes).\n- ARM: 9182/1: mmu: fix returns from early_param() and __setup() functions (git-fixes).\n- ARM: Fix kgdb breakpoint for Thumb2 (git-fixes).\n- ASoC: cs4265: Fix the duplicated control name (git-fixes).\n- ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min (git-fixes).\n- ASoC: rt5668: do not block workqueue if card is unbound (git-fixes).\n- ASoC: rt5682: do not block workqueue if card is unbound (git-fixes).\n- Bluetooth: btusb: Add missing Chicony device for Realtek RTL8723BE (bsc#1196779).\n- EDAC/altera: Fix deferred probing (bsc#1178134).\n- EDAC: Fix calculation of returned address and next offset in edac_align_ptr() (bsc#1178134).\n- HID: add mapping for KEY_ALL_APPLICATIONS (git-fixes).\n- HID: add mapping for KEY_DICTATE (git-fixes).\n- Hand over the maintainership to SLE15-SP3 maintainers\n- IB/hfi1: Correct guard on eager buffer deallocation (git-fixes).\n- IB/hfi1: Fix early init panic (git-fixes).\n- IB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr (git-fixes).\n- IB/hfi1: Insure use of smp_processor_id() is preempt disabled (git-fixes).\n- IB/rdmavt: Validate remote_addr during loopback atomic tests (git-fixes).\n- Input: clear BTN_RIGHT/MIDDLE on buttonpads (git-fixes).\n- Input: elan_i2c - fix regulator enable count imbalance after suspend/resume (git-fixes).\n- Input: elan_i2c - move regulator_[en|dis]able() out of elan_[en|dis]able_power() (git-fixes).\n- NFC: port100: fix use-after-free in port100_send_complete (git-fixes).\n- RDMA/bnxt_re: Scan the whole bitmap when checking if 'disabling RCFW with pending cmd-bit' (git-fixes).\n- RDMA/cma: Do not change route.addr.src_addr outside state checks (bsc#1181147).\n- RDMA/cma: Let cma_resolve_ib_dev() continue search even after empty entry (git-fixes).\n- RDMA/cma: Remove open coding of overflow checking for private_data_len (git-fixes).\n- RDMA/core: Do not infoleak GRH fields (git-fixes).\n- RDMA/core: Let ib_find_gid() continue search even after empty entry (git-fixes).\n- RDMA/cxgb4: Set queue pair state when being queried (git-fixes).\n- RDMA/hns: Validate the pkey index (git-fixes).\n- RDMA/ib_srp: Fix a deadlock (git-fixes).\n- RDMA/mlx4: Do not continue event handler after memory allocation failure (git-fixes).\n- RDMA/rtrs-clt: Fix possible double free in error case (jsc#SLE-15176).\n- RDMA/rxe: Fix a typo in opcode name (git-fixes).\n- RDMA/siw: Fix broken RDMA Read Fence/Resume logic (git-fixes).\n- RDMA/uverbs: Check for null return of kmalloc_array (git-fixes).\n- RDMA/uverbs: Remove the unnecessary assignment (git-fixes).\n- Revert 'USB: serial: ch341: add new Product ID for CH341A' (git-fixes).\n- SUNRPC: avoid race between mod_timer() and del_timer_sync() (bnc#1195403).\n- USB: gadget: validate endpoint index for xilinx udc (git-fixes).\n- USB: gadget: validate interface OS descriptor requests (git-fixes).\n- USB: hub: Clean up use of port initialization schemes and retries (git-fixes).\n- USB: serial: option: add Telit LE910R1 compositions (git-fixes).\n- USB: serial: option: add support for DW5829e (git-fixes).\n- USB: zaurus: support another broken Zaurus (git-fixes).\n- arm64: dts: rockchip: Switch RK3399-Gru DP to SPDIF output (git-fixes).\n- asix: fix uninit-value in asix_mdio_read() (git-fixes).\n- ata: pata_hpt37x: disable primary channel on HPT371 (git-fixes).\n- ax25: Fix NULL pointer dereference in ax25_kill_by_device (git-fixes).\n- batman-adv: Do not expect inter-netns unique iflink indices (git-fixes).\n- batman-adv: Request iflink once in batadv-on-batadv check (git-fixes).\n- batman-adv: Request iflink once in batadv_get_real_netdevice (git-fixes).\n- blk-mq: do not free tags if the tag_set is used by other device in queue initialztion (bsc#1193787).\n- bnxt_en: Fix active FEC reporting to ethtool (jsc#SLE-16649).\n- bnxt_en: Fix incorrect multicast rx mask setting when not requested (git-fixes).\n- bnxt_en: Fix occasional ethtool -t loopback test failures (git-fixes).\n- bnxt_en: Fix offline ethtool selftest with RDMA enabled (git-fixes).\n- bonding: force carrier update when releasing slave (git-fixes).\n- build initrd without systemd This reduces the size of the initrd by over 25%, which improves startup time of the virtual machine by 0.5-0.6s on very fast machines, more on slower ones.\n- can: gs_usb: change active_channels's type from atomic_t to u8 (git-fixes).\n- cgroup-v1: Correct privileges check in release_agent writes (bsc#1196723).\n- cgroup/cpuset: Fix 'suspicious RCU usage' lockdep warning (bsc#1196868).\n- clk: jz4725b: fix mmc0 clock gating (git-fixes).\n- constraints: Also adjust disk requirement for x86 and s390.\n- constraints: Increase disk space for aarch64\n- cpufreq: schedutil: Use kobject release() method to free (git-fixes)\n- cpuset: Fix the bug that subpart_cpus updated wrongly in update_cpumask() (bsc#1196866).\n- cputime, cpuacct: Include guest time in user time in (git-fixes)\n- dma-direct: Fix potential NULL pointer dereference (bsc#1196472 ltc#192278).\n- dma-mapping: Allow mixing bypass and mapped DMA operation (bsc#1196472 ltc#192278).\n- dmaengine: shdma: Fix runtime PM imbalance on error (git-fixes).\n- drm/amdgpu: disable MMHUB PG for Picasso (git-fixes).\n- drm/edid: Always set RGB444 (git-fixes).\n- drm/i915/dg1: Wait for pcode/uncore handshake at startup (bsc#1195211).\n- drm/i915/gen11+: Only load DRAM information from pcode (bsc#1195211).\n- drm/i915: Nuke not needed members of dram_info (bsc#1195211).\n- drm/i915: Remove memory frequency calculation (bsc#1195211).\n- drm/i915: Rename is_16gb_dimm to wm_lv_0_adjust_needed (bsc#1195211).\n- drm/sun4i: mixer: Fix P010 and P210 format numbers (git-fixes).\n- efivars: Respect 'block' flag in efivar_entry_set_safe() (git-fixes).\n- exfat: fix i_blocks for files truncated over 4 GiB (git-fixes).\n- exfat: fix incorrect loading of i_blocks for large files (git-fixes).\n- firmware: arm_scmi: Remove space in MODULE_ALIAS name (git-fixes).\n- fix rpm build warning tumbleweed rpm is adding these warnings to the log: It's not recommended to have unversioned Obsoletes: Obsoletes: microcode_ctl\n- gianfar: ethtool: Fix refcount leak in gfar_get_ts_info (git-fixes).\n- gpio: rockchip: Reset int_bothedge when changing trigger (git-fixes).\n- gpio: tegra186: Fix chip_data type confusion (git-fixes).\n- gpio: ts4900: Do not set DAT and OE together (git-fixes).\n- gpiolib: acpi: Convert ACPI value of debounce to microseconds (git-fixes).\n- gtp: remove useless rcu_read_lock() (git-fixes).\n- hamradio: fix macro redefine warning (git-fixes).\n- i2c: bcm2835: Avoid clock stretching timeouts (git-fixes).\n- iavf: Fix missing check for running netdev (git-fixes).\n- ice: initialize local variable 'tlv' (jsc#SLE-12878).\n- igc: igc_read_phy_reg_gpy: drop premature return (git-fixes).\n- igc: igc_write_phy_reg_gpy: drop premature return (git-fixes).\n- iio: Fix error handling for PM (git-fixes).\n- iio: adc: ad7124: fix mask used for setting AIN_BUFP & AIN_BUFM bits (git-fixes).\n- iio: adc: men_z188_adc: Fix a resource leak in an error handling path (git-fixes).\n- ixgbe: xsk: change !netif_carrier_ok() handling in ixgbe_xmit_zc() (git-fixes).\n- kernel-binary.spec.in: Move 20-kernel-default-extra.conf to the correctr directory (bsc#1195051).\n- kernel-binary.spec: Also exclude the kernel signing key from devel package. There is a check in OBS that fails when it is included. Also the key is not reproducible. Fixes: bb988d4625a3 ('kernel-binary: Do not include sourcedir in certificate path.')\n- kernel-binary.spec: Do not use the default certificate path (bsc#1194943). Using the the default path is broken since Linux 5.17\n- kernel-binary: Do not include sourcedir in certificate path. The certs macro runs before build directory is set up so it creates the aggregate of supplied certificates in the source directory. Using this file directly as the certificate in kernel config works but embeds the source directory path in the kernel config. To avoid this symlink the certificate to the build directory and use relative path to refer to it. Also fabricate a certificate in the same location in build directory when none is provided.\n- kernel-obs-build: include 9p (boo#1195353) To be able to share files between host and the qemu vm of the build script, the 9p and 9p_virtio kernel modules need to be included in the initrd of kernel-obs-build.\n- mac80211: fix forwarded mesh frames AC & queue selection (git-fixes).\n- mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work (git-fixes).\n- mac80211_hwsim: report NOACK frames in tx_status (git-fixes).\n- mask out added spinlock in rndis_params (git-fixes).\n- mmc: meson: Fix usage of meson_mmc_post_req() (git-fixes).\n- net/mlx5: Fix possible deadlock on rule deletion (git-fixes).\n- net/mlx5: Fix wrong limitation of metadata match on ecpf (git-fixes).\n- net/mlx5: Update the list of the PCI supported devices (git-fixes).\n- net/mlx5: Update the list of the PCI supported devices (git-fixes).\n- net/mlx5e: Fix modify header actions memory leak (git-fixes).\n- net/mlx5e: Fix page DMA map/unmap attributes (bsc#1196468).\n- net/mlx5e: Fix wrong return value on ioctl EEPROM query failure (git-fixes).\n- net/mlx5e: TC, Reject rules with drop and modify hdr action (git-fixes).\n- net/mlx5e: TC, Reject rules with forward and drop actions (git-fixes).\n- net/mlx5e: kTLS, Use CHECKSUM_UNNECESSARY for device-offloaded packets (jsc#SLE-15172).\n- net/sched: act_ct: Fix flow table lookup after ct clear or switching zones (jsc#SLE-15172).\n- net: dsa: mv88e6xxx: MV88E6097 does not support jumbo configuration (git-fixes).\n- net: ethernet: ti: cpsw: disable PTPv1 hw timestamping advertisement (git-fixes).\n- net: fix up skbs delta_truesize in UDP GRO frag_list (bsc#1176447).\n- net: hns3: Clear the CMDQ registers before unmapping BAR region (git-fixes).\n- net: phy: DP83822: clear MISR2 register to disable interrupts (git-fixes).\n- net: sfc: Replace in_interrupt() usage (git-fixes).\n- net: tipc: validate domain record count on input (bsc#1195254).\n- net: usb: cdc_mbim: avoid altsetting toggling for Telit FN990 (git-fixes).\n- netfilter: nf_tables: fix memory leak during stateful obj update (bsc#1176447).\n- netsec: ignore 'phy-mode' device property on ACPI systems (git-fixes).\n- nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() (git-fixes).\n- nl80211: Handle nla_memdup failures in handle_nan_filter (git-fixes).\n- ntb: intel: fix port config status offset for SPR (git-fixes).\n- nvme-multipath: use vmalloc for ANA log buffer (bsc#1193787).\n- nvme-rdma: fix possible use-after-free in transport error_recovery work (git-fixes).\n- nvme-tcp: fix possible use-after-free in transport error_recovery work (git-fixes).\n- nvme: fix a possible use-after-free in controller reset during load (git-fixes).\n- powerpc/dma: Fallback to dma_ops when persistent memory present (bsc#1196472 ltc#192278). Update config files.\n- powerpc/fadump: register for fadump as early as possible (bsc#1179439 ltc#190038).\n- powerpc/mm: Remove dcache flush from memory remove (bsc#1196433 ltc#196449).\n- powerpc/powernv/memtrace: Fix dcache flushing (bsc#1196433 ltc#196449).\n- powerpc/pseries/iommu: Fix window size for direct mapping with pmem (bsc#1196472 ltc#192278).\n- rpm/*.spec.in: Use https:// urls\n- rpm/arch-symbols,guards,*driver: Replace Novell with SUSE.\n- rpm/check-for-config-changes: Ignore PAHOLE_VERSION.\n- rpm/kernel-docs.spec.in: use %%license for license declarations Limited to SLE15+ to avoid compatibility nightmares.\n- rpm/kernel-source.spec.in: call fdupes per subpackage It is a waste of time to do a global fdupes when we have subpackages.\n- rpm: SC2006: Use $(...) notation instead of legacy backticked `...`.\n- sched/core: Mitigate race (git-fixes)\n- scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() (git-fixes).\n- scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe (git-fixes).\n- scsi: lpfc: Terminate string in lpfc_debugfs_nvmeio_trc_write() (git-fixes).\n- scsi: nsp_cs: Check of ioremap return value (git-fixes).\n- scsi: qedf: Fix potential dereference of NULL pointer (git-fixes).\n- scsi: smartpqi: Add PCI IDs (bsc#1196627).\n- scsi: ufs: Fix race conditions related to driver data (git-fixes).\n- selftests: mlxsw: tc_police_scale: Make test more robust (bsc#1176774).\n- soc: fsl: Correct MAINTAINERS database (QUICC ENGINE LIBRARY) (git-fixes).\n- soc: fsl: Correct MAINTAINERS database (SOC) (git-fixes).\n- soc: fsl: qe: Check of ioremap return value (git-fixes).\n- spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op() (git-fixes).\n- sr9700: sanity check for packet length (bsc#1196836).\n- staging: gdm724x: fix use after free in gdm_lte_rx() (git-fixes).\n- tracing: Fix return value of __setup handlers (git-fixes).\n- tty: n_gsm: fix encoding of control signal octet bit DV (git-fixes).\n- tty: n_gsm: fix proper link termination after failed open (git-fixes).\n- usb: dwc2: Fix Stalling a Non-Isochronous OUT EP (git-fixes).\n- usb: dwc2: gadget: Fix GOUTNAK flow for Slave mode (git-fixes).\n- usb: dwc2: gadget: Fix kill_all_requests race (git-fixes).\n- usb: dwc2: use well defined macros for power_down (git-fixes).\n- usb: dwc3: gadget: Let the interrupt handler disable bottom halves (git-fixes).\n- usb: dwc3: meson-g12a: Disable the regulator in the error handling path of the probe (git-fixes).\n- usb: dwc3: pci: Fix Bay Trail phy GPIO mappings (git-fixes).\n- usb: gadget: rndis: add spinlock for rndis response list (git-fixes).\n- usb: host: xen-hcd: add missing unlock in error path (git-fixes).\n- usb: hub: Fix locking issues with address0_mutex (git-fixes).\n- usb: hub: Fix usb enumeration issue due to address0 race (git-fixes).\n- vrf: Fix fast path output packet handling with async Netfilter rules (git-fixes).\n- xen/usb: do not use gnttab_end_foreign_access() in xenhcd_gnttab_done() (bsc#1196488, XSA-396).\n- xhci: Prevent futile URB re-submissions due to incorrect return value (git-fixes).\n- xhci: re-initialize the HC during resume if HCE was set (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-1039,SUSE-SLE-Module-Basesystem-15-SP3-2022-1039,SUSE-SLE-Module-Development-Tools-15-SP3-2022-1039,SUSE-SLE-Module-Legacy-15-SP3-2022-1039,SUSE-SLE-Module-Live-Patching-15-SP3-2022-1039,SUSE-SLE-Product-HA-15-SP3-2022-1039,SUSE-SLE-Product-WE-15-SP3-2022-1039,SUSE-SUSE-MicroOS-5.1-2022-1039", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_1039-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:1039-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20221039-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:1039-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html", }, { category: "self", summary: "SUSE Bug 1176447", url: "https://bugzilla.suse.com/1176447", }, { category: "self", summary: "SUSE Bug 1176774", url: "https://bugzilla.suse.com/1176774", }, { category: "self", summary: "SUSE Bug 1178134", url: "https://bugzilla.suse.com/1178134", }, { category: "self", summary: "SUSE Bug 1179439", url: "https://bugzilla.suse.com/1179439", }, { category: "self", summary: "SUSE Bug 1181147", url: "https://bugzilla.suse.com/1181147", }, { category: "self", summary: "SUSE Bug 1191428", url: "https://bugzilla.suse.com/1191428", }, { category: "self", summary: "SUSE Bug 1192273", url: "https://bugzilla.suse.com/1192273", }, { category: "self", summary: "SUSE Bug 1193731", url: "https://bugzilla.suse.com/1193731", }, { category: "self", summary: "SUSE Bug 1193787", url: "https://bugzilla.suse.com/1193787", }, { category: "self", summary: "SUSE Bug 1193864", url: "https://bugzilla.suse.com/1193864", }, { category: "self", summary: "SUSE Bug 1194463", url: "https://bugzilla.suse.com/1194463", }, { category: "self", summary: "SUSE Bug 1194516", url: "https://bugzilla.suse.com/1194516", }, { category: "self", summary: "SUSE Bug 1194943", url: "https://bugzilla.suse.com/1194943", }, { category: "self", summary: "SUSE Bug 1195051", url: "https://bugzilla.suse.com/1195051", }, { category: "self", summary: "SUSE Bug 1195211", url: "https://bugzilla.suse.com/1195211", }, { category: "self", summary: "SUSE Bug 1195254", url: "https://bugzilla.suse.com/1195254", }, { category: "self", summary: "SUSE Bug 1195353", url: "https://bugzilla.suse.com/1195353", }, { category: "self", summary: "SUSE Bug 1195403", url: "https://bugzilla.suse.com/1195403", }, { category: "self", summary: "SUSE Bug 1195612", url: "https://bugzilla.suse.com/1195612", }, { category: "self", summary: "SUSE Bug 1195897", url: "https://bugzilla.suse.com/1195897", }, { category: "self", summary: "SUSE Bug 1195905", url: "https://bugzilla.suse.com/1195905", }, { category: "self", summary: "SUSE Bug 1195939", url: "https://bugzilla.suse.com/1195939", }, { category: "self", summary: "SUSE Bug 1195949", url: "https://bugzilla.suse.com/1195949", }, { category: "self", summary: "SUSE Bug 1195987", url: "https://bugzilla.suse.com/1195987", }, { category: "self", summary: "SUSE Bug 1196079", url: "https://bugzilla.suse.com/1196079", }, { category: "self", summary: "SUSE Bug 1196095", url: "https://bugzilla.suse.com/1196095", }, { category: "self", summary: "SUSE Bug 1196130", url: "https://bugzilla.suse.com/1196130", }, { category: "self", summary: "SUSE Bug 1196132", url: "https://bugzilla.suse.com/1196132", }, { category: "self", summary: "SUSE Bug 1196155", url: "https://bugzilla.suse.com/1196155", }, { category: "self", summary: "SUSE Bug 1196299", url: "https://bugzilla.suse.com/1196299", }, { category: "self", summary: "SUSE Bug 1196301", url: "https://bugzilla.suse.com/1196301", }, { category: "self", summary: "SUSE Bug 1196433", url: "https://bugzilla.suse.com/1196433", }, { category: "self", summary: "SUSE Bug 1196468", url: "https://bugzilla.suse.com/1196468", }, { category: "self", summary: "SUSE Bug 1196472", url: "https://bugzilla.suse.com/1196472", }, { category: "self", summary: "SUSE Bug 1196488", url: "https://bugzilla.suse.com/1196488", }, { category: "self", summary: "SUSE Bug 1196627", url: "https://bugzilla.suse.com/1196627", }, { category: "self", summary: "SUSE Bug 1196723", url: "https://bugzilla.suse.com/1196723", }, { category: "self", summary: "SUSE Bug 1196779", url: "https://bugzilla.suse.com/1196779", }, { category: "self", summary: "SUSE Bug 1196830", url: "https://bugzilla.suse.com/1196830", }, { category: "self", summary: "SUSE Bug 1196836", url: "https://bugzilla.suse.com/1196836", }, { category: "self", summary: "SUSE Bug 1196866", url: "https://bugzilla.suse.com/1196866", }, { category: "self", summary: "SUSE Bug 1196868", url: "https://bugzilla.suse.com/1196868", }, { category: "self", summary: "SUSE Bug 1196956", url: "https://bugzilla.suse.com/1196956", }, { category: "self", summary: "SUSE Bug 1196959", url: "https://bugzilla.suse.com/1196959", }, { category: "self", summary: "SUSE CVE CVE-2021-0920 page", url: "https://www.suse.com/security/cve/CVE-2021-0920/", }, { category: "self", summary: "SUSE CVE CVE-2021-39657 page", url: "https://www.suse.com/security/cve/CVE-2021-39657/", }, { category: "self", summary: "SUSE CVE CVE-2021-39698 page", url: "https://www.suse.com/security/cve/CVE-2021-39698/", }, { category: "self", summary: "SUSE CVE CVE-2021-44879 page", url: "https://www.suse.com/security/cve/CVE-2021-44879/", }, { category: "self", summary: "SUSE CVE CVE-2021-45402 page", url: "https://www.suse.com/security/cve/CVE-2021-45402/", }, { category: "self", summary: "SUSE CVE CVE-2022-0487 page", url: "https://www.suse.com/security/cve/CVE-2022-0487/", }, { category: "self", summary: "SUSE CVE CVE-2022-0617 page", url: "https://www.suse.com/security/cve/CVE-2022-0617/", }, { category: "self", summary: "SUSE CVE CVE-2022-0644 page", url: "https://www.suse.com/security/cve/CVE-2022-0644/", }, { category: "self", summary: "SUSE CVE CVE-2022-23036 page", url: "https://www.suse.com/security/cve/CVE-2022-23036/", }, { category: "self", summary: "SUSE CVE CVE-2022-23037 page", url: "https://www.suse.com/security/cve/CVE-2022-23037/", }, { category: "self", summary: "SUSE CVE CVE-2022-23038 page", url: "https://www.suse.com/security/cve/CVE-2022-23038/", }, { category: "self", summary: "SUSE CVE CVE-2022-23039 page", url: "https://www.suse.com/security/cve/CVE-2022-23039/", }, { category: "self", summary: "SUSE CVE CVE-2022-23040 page", url: "https://www.suse.com/security/cve/CVE-2022-23040/", }, { category: "self", summary: "SUSE CVE CVE-2022-23041 page", url: "https://www.suse.com/security/cve/CVE-2022-23041/", }, { category: "self", summary: "SUSE CVE CVE-2022-23042 page", url: "https://www.suse.com/security/cve/CVE-2022-23042/", }, { category: "self", summary: "SUSE CVE CVE-2022-24448 page", url: "https://www.suse.com/security/cve/CVE-2022-24448/", }, { category: "self", summary: "SUSE CVE CVE-2022-24958 page", url: "https://www.suse.com/security/cve/CVE-2022-24958/", }, { category: "self", summary: "SUSE CVE CVE-2022-24959 page", url: "https://www.suse.com/security/cve/CVE-2022-24959/", }, { category: "self", summary: "SUSE CVE CVE-2022-25258 page", url: "https://www.suse.com/security/cve/CVE-2022-25258/", }, { category: "self", summary: "SUSE CVE CVE-2022-25636 page", url: "https://www.suse.com/security/cve/CVE-2022-25636/", }, { category: "self", summary: "SUSE CVE CVE-2022-26490 page", url: "https://www.suse.com/security/cve/CVE-2022-26490/", }, { category: "self", summary: "SUSE CVE CVE-2022-26966 page", url: "https://www.suse.com/security/cve/CVE-2022-26966/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2022-03-30T07:38:49Z", generator: { date: "2022-03-30T07:38:49Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:1039-1", initial_release_date: "2022-03-30T07:38:49Z", revision_history: [ { date: "2022-03-30T07:38:49Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", product: { name: "cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", product_id: "cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", product: { name: "cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", product_id: "cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", product: { name: "cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", product_id: "cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", product: { name: "dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", product_id: "dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", product: { name: "dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", product_id: "dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", product: { name: "dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", product_id: "dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-al-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-al-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-al-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-allwinner-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-allwinner-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-allwinner-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-altera-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-altera-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-altera-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-amd-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-amd-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-amd-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-amlogic-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-amlogic-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-amlogic-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-apm-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-apm-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-apm-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-arm-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-arm-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-arm-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-broadcom-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-broadcom-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-broadcom-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-cavium-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-cavium-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-cavium-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-exynos-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-exynos-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-exynos-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-freescale-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-freescale-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-freescale-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-lg-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-lg-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-lg-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-marvell-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-marvell-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-marvell-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-mediatek-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-mediatek-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-mediatek-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-nvidia-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-nvidia-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-nvidia-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-qcom-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-qcom-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-qcom-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-renesas-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-renesas-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-renesas-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-rockchip-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-rockchip-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-rockchip-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-socionext-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-socionext-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-socionext-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-sprd-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-sprd-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-sprd-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-xilinx-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-xilinx-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-xilinx-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-zte-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-zte-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-zte-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", product: { name: "gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", product_id: "gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", product: { name: "gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", product_id: "gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", product: { name: "gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", product_id: "gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-64kb-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-64kb-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-64kb-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-default-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-default-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-default-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", product: { name: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", product_id: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", product: { name: "kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", product_id: "kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-default-devel-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-default-devel-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-default-extra-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-default-extra-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-default-optional-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-default-optional-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-default-optional-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-obs-build-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-obs-build-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-preempt-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-preempt-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-preempt-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-syms-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-syms-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", product: { name: "kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", product_id: "kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", product: { name: "kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", product_id: "kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", product: { name: "kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", product_id: "kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", product: { name: "ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", product_id: "ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", product: { name: "ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", product_id: "ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", product: { name: "ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", product_id: "ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", product: { name: "reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", product_id: "reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", product: { name: "reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", product_id: "reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", product: { name: "reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", product_id: "reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-5.3.18-150300.59.60.4.noarch", product: { name: "kernel-devel-5.3.18-150300.59.60.4.noarch", product_id: "kernel-devel-5.3.18-150300.59.60.4.noarch", }, }, { category: "product_version", name: "kernel-docs-5.3.18-150300.59.60.4.noarch", product: { name: "kernel-docs-5.3.18-150300.59.60.4.noarch", product_id: "kernel-docs-5.3.18-150300.59.60.4.noarch", }, }, { category: "product_version", name: "kernel-docs-html-5.3.18-150300.59.60.4.noarch", product: { name: "kernel-docs-html-5.3.18-150300.59.60.4.noarch", product_id: "kernel-docs-html-5.3.18-150300.59.60.4.noarch", }, }, { category: "product_version", name: "kernel-macros-5.3.18-150300.59.60.4.noarch", product: { name: "kernel-macros-5.3.18-150300.59.60.4.noarch", product_id: "kernel-macros-5.3.18-150300.59.60.4.noarch", }, }, { category: "product_version", name: "kernel-source-5.3.18-150300.59.60.4.noarch", product: { name: "kernel-source-5.3.18-150300.59.60.4.noarch", product_id: "kernel-source-5.3.18-150300.59.60.4.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", product: { name: "kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", product_id: "kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", product: { name: "cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", product_id: "cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", product: { name: "dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", product_id: "dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", product: { name: "gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", product_id: "gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "kernel-debug-5.3.18-150300.59.60.4.ppc64le", product: { name: "kernel-debug-5.3.18-150300.59.60.4.ppc64le", product_id: "kernel-debug-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", product: { name: "kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", product_id: "kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", product: { name: "kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", product_id: "kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "kernel-default-5.3.18-150300.59.60.4.ppc64le", product: { name: "kernel-default-5.3.18-150300.59.60.4.ppc64le", product_id: "kernel-default-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", product: { name: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", product_id: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", product: { name: "kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", product_id: "kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", product: { name: "kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", product_id: "kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", product: { name: "kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", product_id: "kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", product: { name: "kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", product_id: "kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", product: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", product_id: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", product: { name: "kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", product_id: "kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", product: { name: "kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", product_id: "kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", product: { name: "kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", product_id: "kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", product: { name: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", product_id: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", product: { name: "kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", product_id: "kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", product: { name: "kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", product_id: "kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", product: { name: "kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", product_id: "kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150300.59.60.4.ppc64le", product: { name: "kernel-syms-5.3.18-150300.59.60.4.ppc64le", product_id: "kernel-syms-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", product: { name: "kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", product_id: "kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", product: { name: "ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", product_id: "ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", product: { name: "reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", product_id: "reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", product: { name: "cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", product_id: "cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150300.59.60.4.s390x", product: { name: "dlm-kmp-default-5.3.18-150300.59.60.4.s390x", product_id: "dlm-kmp-default-5.3.18-150300.59.60.4.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", product: { name: "gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", product_id: "gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", }, }, { category: "product_version", name: "kernel-default-5.3.18-150300.59.60.4.s390x", product: { name: "kernel-default-5.3.18-150300.59.60.4.s390x", product_id: "kernel-default-5.3.18-150300.59.60.4.s390x", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", product: { name: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", product_id: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", product: { name: "kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", product_id: "kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150300.59.60.4.s390x", product: { name: "kernel-default-devel-5.3.18-150300.59.60.4.s390x", product_id: "kernel-default-devel-5.3.18-150300.59.60.4.s390x", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150300.59.60.4.s390x", product: { name: "kernel-default-extra-5.3.18-150300.59.60.4.s390x", product_id: "kernel-default-extra-5.3.18-150300.59.60.4.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", product: { name: "kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", product_id: "kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", product: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", product_id: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", }, }, { category: "product_version", name: "kernel-default-optional-5.3.18-150300.59.60.4.s390x", product: { name: "kernel-default-optional-5.3.18-150300.59.60.4.s390x", product_id: "kernel-default-optional-5.3.18-150300.59.60.4.s390x", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", product: { name: "kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", product_id: "kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150300.59.60.4.s390x", product: { name: "kernel-obs-build-5.3.18-150300.59.60.4.s390x", product_id: "kernel-obs-build-5.3.18-150300.59.60.4.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150300.59.60.4.s390x", product: { name: "kernel-obs-qa-5.3.18-150300.59.60.4.s390x", product_id: "kernel-obs-qa-5.3.18-150300.59.60.4.s390x", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150300.59.60.4.s390x", product: { name: "kernel-syms-5.3.18-150300.59.60.4.s390x", product_id: "kernel-syms-5.3.18-150300.59.60.4.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", product: { name: "kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", product_id: "kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", product: { name: "kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", product_id: "kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", product: { name: "ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", product_id: "ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", product: { name: "reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", product_id: "reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", product: { name: "cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", product_id: "cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", product: { name: "cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", product_id: "cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", product: { name: "dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", product_id: "dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", product: { name: "dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", product_id: "dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", product: { name: "gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", product_id: "gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", product: { name: "gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", product_id: "gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-debug-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-debug-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-debug-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-default-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-default-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-default-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", product: { name: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", product_id: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", product: { name: "kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", product_id: "kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-default-devel-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-default-devel-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-default-extra-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-default-extra-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-default-optional-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-default-optional-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-default-optional-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", product: { name: "kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", product_id: "kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150300_59_60-preempt-1-150300.7.5.3.x86_64", product: { name: "kernel-livepatch-5_3_18-150300_59_60-preempt-1-150300.7.5.3.x86_64", product_id: "kernel-livepatch-5_3_18-150300_59_60-preempt-1-150300.7.5.3.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-obs-build-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-obs-build-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-preempt-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-preempt-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-preempt-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-syms-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-syms-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", product: { name: "kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", product_id: "kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", product: { name: "kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", product_id: "kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", product: { name: "ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", product_id: "ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", product: { name: "ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", product_id: "ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", product: { name: "reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", product_id: "reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", product: { name: "reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", product_id: "reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Development Tools 15 SP3", product: { name: "SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-development-tools:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Legacy 15 SP3", product: { name: "SUSE Linux Enterprise Module for Legacy 15 SP3", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-legacy:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP3", product: { name: "SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 15 SP3", product: { name: "SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 15 SP3", product: { name: "SUSE Linux Enterprise Workstation Extension 15 SP3", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Micro 5.1", product: { name: "SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-microos:5.1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-64kb-5.3.18-150300.59.60.4.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", }, product_reference: "kernel-64kb-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", }, product_reference: "kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.60.4.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", }, product_reference: "kernel-default-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.60.4.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", }, product_reference: "kernel-default-5.3.18-150300.59.60.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.60.4.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", }, product_reference: "kernel-default-5.3.18-150300.59.60.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.60.4.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", }, product_reference: "kernel-default-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", }, product_reference: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", }, product_reference: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", }, product_reference: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", }, product_reference: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.60.4.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", }, product_reference: "kernel-default-devel-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.60.4.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", }, product_reference: "kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.60.4.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", }, product_reference: "kernel-default-devel-5.3.18-150300.59.60.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.60.4.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", }, product_reference: "kernel-default-devel-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-150300.59.60.4.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", }, product_reference: "kernel-devel-5.3.18-150300.59.60.4.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-150300.59.60.4.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", }, product_reference: "kernel-macros-5.3.18-150300.59.60.4.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150300.59.60.4.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", }, product_reference: "kernel-preempt-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150300.59.60.4.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", }, product_reference: "kernel-preempt-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-5.3.18-150300.59.60.4.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", }, product_reference: "kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-150300.59.60.4.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", }, product_reference: "kernel-docs-5.3.18-150300.59.60.4.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.60.4.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", }, product_reference: "kernel-obs-build-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.60.4.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", }, product_reference: "kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.60.4.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", }, product_reference: "kernel-obs-build-5.3.18-150300.59.60.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.60.4.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", }, product_reference: "kernel-obs-build-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", }, product_reference: "kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-150300.59.60.4.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", }, product_reference: "kernel-source-5.3.18-150300.59.60.4.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.60.4.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", }, product_reference: "kernel-syms-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.60.4.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", }, product_reference: "kernel-syms-5.3.18-150300.59.60.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.60.4.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", }, product_reference: "kernel-syms-5.3.18-150300.59.60.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.60.4.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", }, product_reference: "kernel-syms-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP3", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP3", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", }, product_reference: "kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150300.59.60.4.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", }, product_reference: "kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", }, product_reference: "kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", }, product_reference: "kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", }, product_reference: "kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", }, product_reference: "kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", }, product_reference: "cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", }, product_reference: "cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", }, product_reference: "cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", }, product_reference: "cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150300.59.60.4.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", }, product_reference: "dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", }, product_reference: "dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150300.59.60.4.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", }, product_reference: "dlm-kmp-default-5.3.18-150300.59.60.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150300.59.60.4.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", }, product_reference: "dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", }, product_reference: "gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", }, product_reference: "gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150300.59.60.4.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", }, product_reference: "gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", }, product_reference: "gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", }, product_reference: "ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", }, product_reference: "ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", }, product_reference: "ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", }, product_reference: "ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.3.18-150300.59.60.4.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", }, product_reference: "kernel-default-extra-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", }, product_reference: "kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.60.4.aarch64 as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", }, product_reference: "kernel-default-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.60.4.s390x as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", }, product_reference: "kernel-default-5.3.18-150300.59.60.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.60.4.x86_64 as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", }, product_reference: "kernel-default-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64 as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", }, product_reference: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", }, product_reference: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64 as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", }, product_reference: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, ], }, vulnerabilities: [ { cve: "CVE-2021-0920", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-0920", }, ], notes: [ { category: "general", text: "In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-0920", url: "https://www.suse.com/security/cve/CVE-2021-0920", }, { category: "external", summary: "SUSE Bug 1193731 for CVE-2021-0920", url: "https://bugzilla.suse.com/1193731", }, { category: "external", summary: "SUSE Bug 1194463 for CVE-2021-0920", url: "https://bugzilla.suse.com/1194463", }, { category: "external", summary: "SUSE Bug 1195939 for CVE-2021-0920", url: "https://bugzilla.suse.com/1195939", }, { category: "external", summary: "SUSE Bug 1199255 for CVE-2021-0920", url: "https://bugzilla.suse.com/1199255", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2021-0920", url: "https://bugzilla.suse.com/1200084", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:49Z", details: "important", }, ], title: "CVE-2021-0920", }, { cve: "CVE-2021-39657", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39657", }, ], notes: [ { category: "general", text: "In ufshcd_eh_device_reset_handler of ufshcd.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-194696049References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39657", url: "https://www.suse.com/security/cve/CVE-2021-39657", }, { category: "external", summary: "SUSE Bug 1193864 for CVE-2021-39657", url: "https://bugzilla.suse.com/1193864", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:49Z", details: "low", }, ], title: "CVE-2021-39657", }, { cve: "CVE-2021-39698", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39698", }, ], notes: [ { category: "general", text: "In aio_poll_complete_work of aio.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-185125206References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39698", url: "https://www.suse.com/security/cve/CVE-2021-39698", }, { category: "external", summary: "SUSE Bug 1196956 for CVE-2021-39698", url: "https://bugzilla.suse.com/1196956", }, { category: "external", summary: "SUSE Bug 1196959 for CVE-2021-39698", url: "https://bugzilla.suse.com/1196959", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2021-39698", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:49Z", details: "important", }, ], title: "CVE-2021-39698", }, { cve: "CVE-2021-44879", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-44879", }, ], notes: [ { category: "general", text: "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-44879", url: "https://www.suse.com/security/cve/CVE-2021-44879", }, { category: "external", summary: "SUSE Bug 1195987 for CVE-2021-44879", url: "https://bugzilla.suse.com/1195987", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:49Z", details: "moderate", }, ], title: "CVE-2021-44879", }, { cve: "CVE-2021-45402", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-45402", }, ], notes: [ { category: "general", text: "The check_alu_op() function in kernel/bpf/verifier.c in the Linux kernel through v5.16-rc5 did not properly update bounds while handling the mov32 instruction, which allows local users to obtain potentially sensitive address information, aka a \"pointer leak.\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-45402", url: "https://www.suse.com/security/cve/CVE-2021-45402", }, { category: "external", summary: "SUSE Bug 1196130 for CVE-2021-45402", url: "https://bugzilla.suse.com/1196130", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:49Z", details: "moderate", }, ], title: "CVE-2021-45402", }, { cve: "CVE-2022-0487", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0487", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0487", url: "https://www.suse.com/security/cve/CVE-2022-0487", }, { category: "external", summary: "SUSE Bug 1194516 for CVE-2022-0487", url: "https://bugzilla.suse.com/1194516", }, { category: "external", summary: "SUSE Bug 1195949 for CVE-2022-0487", url: "https://bugzilla.suse.com/1195949", }, { category: "external", summary: "SUSE Bug 1198615 for CVE-2022-0487", url: "https://bugzilla.suse.com/1198615", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:49Z", details: "moderate", }, ], title: "CVE-2022-0487", }, { cve: "CVE-2022-0617", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0617", }, ], notes: [ { category: "general", text: "A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0617", url: "https://www.suse.com/security/cve/CVE-2022-0617", }, { category: "external", summary: "SUSE Bug 1196079 for CVE-2022-0617", url: "https://bugzilla.suse.com/1196079", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:49Z", details: "moderate", }, ], title: "CVE-2022-0617", }, { cve: "CVE-2022-0644", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0644", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0644", url: "https://www.suse.com/security/cve/CVE-2022-0644", }, { category: "external", summary: "SUSE Bug 1196155 for CVE-2022-0644", url: "https://bugzilla.suse.com/1196155", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:49Z", details: "moderate", }, ], title: "CVE-2022-0644", }, { cve: "CVE-2022-23036", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-23036", }, ], notes: [ { category: "general", text: "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-23036", url: "https://www.suse.com/security/cve/CVE-2022-23036", }, { category: "external", summary: "SUSE Bug 1196488 for CVE-2022-23036", url: "https://bugzilla.suse.com/1196488", }, { category: "external", summary: "SUSE Bug 1199099 for CVE-2022-23036", url: "https://bugzilla.suse.com/1199099", }, { category: "external", summary: "SUSE Bug 1199141 for CVE-2022-23036", url: "https://bugzilla.suse.com/1199141", }, { category: "external", summary: "SUSE Bug 1204132 for CVE-2022-23036", url: "https://bugzilla.suse.com/1204132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:49Z", details: "important", }, ], title: "CVE-2022-23036", }, { cve: "CVE-2022-23037", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-23037", }, ], notes: [ { category: "general", text: "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-23037", url: "https://www.suse.com/security/cve/CVE-2022-23037", }, { category: "external", summary: "SUSE Bug 1199099 for CVE-2022-23037", url: "https://bugzilla.suse.com/1199099", }, { category: "external", summary: "SUSE Bug 1199141 for CVE-2022-23037", url: "https://bugzilla.suse.com/1199141", }, { category: "external", summary: "SUSE Bug 1204132 for CVE-2022-23037", url: "https://bugzilla.suse.com/1204132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:49Z", details: "important", }, ], title: "CVE-2022-23037", }, { cve: "CVE-2022-23038", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-23038", }, ], notes: [ { category: "general", text: "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-23038", url: "https://www.suse.com/security/cve/CVE-2022-23038", }, { category: "external", summary: "SUSE Bug 1199099 for CVE-2022-23038", url: "https://bugzilla.suse.com/1199099", }, { category: "external", summary: "SUSE Bug 1199141 for CVE-2022-23038", url: "https://bugzilla.suse.com/1199141", }, { category: "external", summary: "SUSE Bug 1204132 for CVE-2022-23038", url: "https://bugzilla.suse.com/1204132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:49Z", details: "important", }, ], title: "CVE-2022-23038", }, { cve: "CVE-2022-23039", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-23039", }, ], notes: [ { category: "general", text: "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-23039", url: "https://www.suse.com/security/cve/CVE-2022-23039", }, { category: "external", summary: "SUSE Bug 1199099 for CVE-2022-23039", url: "https://bugzilla.suse.com/1199099", }, { category: "external", summary: "SUSE Bug 1199141 for CVE-2022-23039", url: "https://bugzilla.suse.com/1199141", }, { category: "external", summary: "SUSE Bug 1204132 for CVE-2022-23039", url: "https://bugzilla.suse.com/1204132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:49Z", details: "important", }, ], title: "CVE-2022-23039", }, { cve: "CVE-2022-23040", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-23040", }, ], notes: [ { category: "general", text: "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-23040", url: "https://www.suse.com/security/cve/CVE-2022-23040", }, { category: "external", summary: "SUSE Bug 1199099 for CVE-2022-23040", url: "https://bugzilla.suse.com/1199099", }, { category: "external", summary: "SUSE Bug 1199141 for CVE-2022-23040", url: "https://bugzilla.suse.com/1199141", }, { category: "external", summary: "SUSE Bug 1204132 for CVE-2022-23040", url: "https://bugzilla.suse.com/1204132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:49Z", details: "important", }, ], title: "CVE-2022-23040", }, { cve: "CVE-2022-23041", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-23041", }, ], notes: [ { category: "general", text: "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-23041", url: "https://www.suse.com/security/cve/CVE-2022-23041", }, { category: "external", summary: "SUSE Bug 1199099 for CVE-2022-23041", url: "https://bugzilla.suse.com/1199099", }, { category: "external", summary: "SUSE Bug 1199141 for CVE-2022-23041", url: "https://bugzilla.suse.com/1199141", }, { category: "external", summary: "SUSE Bug 1204132 for CVE-2022-23041", url: "https://bugzilla.suse.com/1204132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:49Z", details: "important", }, ], title: "CVE-2022-23041", }, { cve: "CVE-2022-23042", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-23042", }, ], notes: [ { category: "general", text: "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-23042", url: "https://www.suse.com/security/cve/CVE-2022-23042", }, { category: "external", summary: "SUSE Bug 1199099 for CVE-2022-23042", url: "https://bugzilla.suse.com/1199099", }, { category: "external", summary: "SUSE Bug 1199141 for CVE-2022-23042", url: "https://bugzilla.suse.com/1199141", }, { category: "external", summary: "SUSE Bug 1204132 for CVE-2022-23042", url: "https://bugzilla.suse.com/1204132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:49Z", details: "important", }, ], title: "CVE-2022-23042", }, { cve: "CVE-2022-24448", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-24448", }, ], notes: [ { category: "general", text: "An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-24448", url: "https://www.suse.com/security/cve/CVE-2022-24448", }, { category: "external", summary: "SUSE Bug 1195612 for CVE-2022-24448", url: "https://bugzilla.suse.com/1195612", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:49Z", details: "moderate", }, ], title: "CVE-2022-24448", }, { cve: "CVE-2022-24958", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-24958", }, ], notes: [ { category: "general", text: "drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev->buf release.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-24958", url: "https://www.suse.com/security/cve/CVE-2022-24958", }, { category: "external", summary: "SUSE Bug 1195905 for CVE-2022-24958", url: "https://bugzilla.suse.com/1195905", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:49Z", details: "moderate", }, ], title: "CVE-2022-24958", }, { cve: "CVE-2022-24959", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-24959", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-24959", url: "https://www.suse.com/security/cve/CVE-2022-24959", }, { category: "external", summary: "SUSE Bug 1195897 for CVE-2022-24959", url: "https://bugzilla.suse.com/1195897", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:49Z", details: "moderate", }, ], title: "CVE-2022-24959", }, { cve: "CVE-2022-25258", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-25258", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-25258", url: "https://www.suse.com/security/cve/CVE-2022-25258", }, { category: "external", summary: "SUSE Bug 1196095 for CVE-2022-25258", url: "https://bugzilla.suse.com/1196095", }, { category: "external", summary: "SUSE Bug 1196132 for CVE-2022-25258", url: "https://bugzilla.suse.com/1196132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:49Z", details: "important", }, ], title: "CVE-2022-25258", }, { cve: "CVE-2022-25636", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-25636", }, ], notes: [ { category: "general", text: "net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows local users to gain privileges because of a heap out-of-bounds write. This is related to nf_tables_offload.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-25636", url: "https://www.suse.com/security/cve/CVE-2022-25636", }, { category: "external", summary: "SUSE Bug 1196299 for CVE-2022-25636", url: "https://bugzilla.suse.com/1196299", }, { category: "external", summary: "SUSE Bug 1196301 for CVE-2022-25636", url: "https://bugzilla.suse.com/1196301", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:49Z", details: "important", }, ], title: "CVE-2022-25636", }, { cve: "CVE-2022-26490", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-26490", }, ], notes: [ { category: "general", text: "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-26490", url: "https://www.suse.com/security/cve/CVE-2022-26490", }, { category: "external", summary: "SUSE Bug 1196830 for CVE-2022-26490", url: "https://bugzilla.suse.com/1196830", }, { category: "external", summary: "SUSE Bug 1201656 for CVE-2022-26490", url: "https://bugzilla.suse.com/1201656", }, { category: "external", summary: "SUSE Bug 1201969 for CVE-2022-26490", url: "https://bugzilla.suse.com/1201969", }, { category: "external", summary: "SUSE Bug 1211495 for CVE-2022-26490", url: "https://bugzilla.suse.com/1211495", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:49Z", details: "important", }, ], title: "CVE-2022-26490", }, { cve: "CVE-2022-26966", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-26966", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.16.12. drivers/net/usb/sr9700.c allows attackers to obtain sensitive information from heap memory via crafted frame lengths from a device.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-26966", url: "https://www.suse.com/security/cve/CVE-2022-26966", }, { category: "external", summary: "SUSE Bug 1196836 for CVE-2022-26966", url: "https://bugzilla.suse.com/1196836", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-1-150300.7.5.3.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.60.4.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:49Z", details: "moderate", }, ], title: "CVE-2022-26966", }, ], }
WID-SEC-W-2022-0137
Vulnerability from csaf_certbund
Published
2022-06-06 22:00
Modified
2024-06-24 22:00
Summary
Android Patchday Juni 2022
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das Android Betriebssystem von Google ist eine quelloffene Plattform für mobile Geräte. Die Basis bildet der Linux-Kernel.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.
Betroffene Betriebssysteme
- Android
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Das Android Betriebssystem von Google ist eine quelloffene Plattform für mobile Geräte. Die Basis bildet der Linux-Kernel.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", title: "Angriff", }, { category: "general", text: "- Android", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-0137 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0137.json", }, { category: "self", summary: "WID-SEC-2022-0137 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0137", }, { category: "external", summary: "Android Security Advisory vom 2022-06-06", url: "https://source.android.com/security/bulletin/2022-06-01", }, { category: "external", summary: "Pixel Security Advisory vom 2022-06-06", url: "https://source.android.com/security/bulletin/pixel/2022-06-01", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2423-1 vom 2022-07-18", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011576.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2422-1 vom 2022-07-18", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011579.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2443-1 vom 2022-07-20", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011597.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2435-1 vom 2022-07-19", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011594.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2445-1 vom 2022-07-20", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011599.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2460-1 vom 2022-07-20", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011608.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2461-1 vom 2022-07-21", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011609.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2516-1 vom 2022-07-21", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011614.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2515-1 vom 2022-07-21", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011613.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2697-1 vom 2022-08-09", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011824.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2696-1 vom 2022-08-09", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011823.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2699-1 vom 2022-08-09", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011825.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2728-1 vom 2022-08-10", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011840.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2779-1 vom 2022-08-11", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011894.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2809-1 vom 2022-08-16", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:0412 vom 2024-01-25", url: "https://access.redhat.com/errata/RHSA-2024:0412", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:0856-1 vom 2024-03-13", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:2010-1 vom 2024-06-12", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018711.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALASKERNEL-5.4-2024-073 vom 2024-06-25", url: "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-073.html", }, ], source_lang: "en-US", title: "Android Patchday Juni 2022", tracking: { current_release_date: "2024-06-24T22:00:00.000+00:00", generator: { date: "2024-08-15T17:26:47.711+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-0137", initial_release_date: "2022-06-06T22:00:00.000+00:00", revision_history: [ { date: "2022-06-06T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2022-07-18T22:00:00.000+00:00", number: "2", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-07-19T22:00:00.000+00:00", number: "3", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-07-20T22:00:00.000+00:00", number: "4", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-07-21T22:00:00.000+00:00", number: "5", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-08-08T22:00:00.000+00:00", number: "6", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-08-09T22:00:00.000+00:00", number: "7", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-08-10T22:00:00.000+00:00", number: "8", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-08-15T22:00:00.000+00:00", number: "9", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-01-25T23:00:00.000+00:00", number: "10", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-03-12T23:00:00.000+00:00", number: "11", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-06-12T22:00:00.000+00:00", number: "12", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-06-24T22:00:00.000+00:00", number: "13", summary: "Neue Updates von Amazon aufgenommen", }, ], status: "final", version: "13", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { branches: [ { category: "product_version", name: "11", product: { name: "Google Android 11", product_id: "T017166", product_identification_helper: { cpe: "cpe:/o:google:android:11", }, }, }, { category: "product_version", name: "10", product: { name: "Google Android 10", product_id: "T019174", product_identification_helper: { cpe: "cpe:/o:google:android:10", }, }, }, { category: "product_version", name: "12", product: { name: "Google Android 12", product_id: "T020881", product_identification_helper: { cpe: "cpe:/o:google:android:12", }, }, }, { category: "product_version", name: "12L", product: { name: "Google Android 12L", product_id: "T023028", product_identification_helper: { cpe: "cpe:/o:google:android:12l", }, }, }, ], category: "product_name", name: "Android", }, ], category: "vendor", name: "Google", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, ], }, vulnerabilities: [ { cve: "CVE-2018-25020", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2018-25020", }, { cve: "CVE-2021-0983", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-0983", }, { cve: "CVE-2021-20268", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-20268", }, { cve: "CVE-2021-20321", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-20321", }, { cve: "CVE-2021-31440", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-31440", }, { cve: "CVE-2021-34556", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-34556", }, { cve: "CVE-2021-35083", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-35083", }, { cve: "CVE-2021-35102", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-35102", }, { cve: "CVE-2021-35111", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-35111", }, { cve: "CVE-2021-35118", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-35118", }, { cve: "CVE-2021-35119", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-35119", }, { cve: "CVE-2021-35120", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-35120", }, { cve: "CVE-2021-35121", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-35121", }, { cve: "CVE-2021-3635", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-3635", }, { cve: "CVE-2021-3715", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-3715", }, { cve: "CVE-2021-3743", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-3743", }, { cve: "CVE-2021-3753", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-3753", }, { cve: "CVE-2021-38160", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-38160", }, { cve: "CVE-2021-39624", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-39624", }, { cve: "CVE-2021-39653", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-39653", }, { cve: "CVE-2021-39691", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-39691", }, { cve: "CVE-2021-39806", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-39806", }, { cve: "CVE-2021-4154", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-4154", }, { cve: "CVE-2021-44733", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-44733", }, { cve: "CVE-2022-0492", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-0492", }, { cve: "CVE-2022-20006", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20006", }, { cve: "CVE-2022-20123", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20123", }, { cve: "CVE-2022-20124", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20124", }, { cve: "CVE-2022-20125", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20125", }, { cve: "CVE-2022-20126", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20126", }, { cve: "CVE-2022-20127", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20127", }, { cve: "CVE-2022-20129", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20129", }, { cve: "CVE-2022-20130", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20130", }, { cve: "CVE-2022-20131", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20131", }, { cve: "CVE-2022-20132", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20132", }, { cve: "CVE-2022-20133", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20133", }, { cve: "CVE-2022-20134", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20134", }, { cve: "CVE-2022-20135", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20135", }, { cve: "CVE-2022-20136", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20136", }, { cve: "CVE-2022-20137", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20137", }, { cve: "CVE-2022-20138", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20138", }, { cve: "CVE-2022-20139", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20139", }, { cve: "CVE-2022-20140", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20140", }, { cve: "CVE-2022-20141", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20141", }, { cve: "CVE-2022-20142", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20142", }, { cve: "CVE-2022-20143", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20143", }, { cve: "CVE-2022-20144", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20144", }, { cve: "CVE-2022-20145", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20145", }, { cve: "CVE-2022-20146", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20146", }, { cve: "CVE-2022-20147", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20147", }, { cve: "CVE-2022-20148", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20148", }, { cve: "CVE-2022-20149", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20149", }, { cve: "CVE-2022-20150", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20150", }, { cve: "CVE-2022-20151", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20151", }, { cve: "CVE-2022-20152", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20152", }, { cve: "CVE-2022-20153", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20153", }, { cve: "CVE-2022-20154", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20154", }, { cve: "CVE-2022-20155", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20155", }, { cve: "CVE-2022-20156", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20156", }, { cve: "CVE-2022-20157", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20157", }, { cve: "CVE-2022-20159", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20159", }, { cve: "CVE-2022-20160", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20160", }, { cve: "CVE-2022-20162", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20162", }, { cve: "CVE-2022-20164", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20164", }, { cve: "CVE-2022-20165", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20165", }, { cve: "CVE-2022-20166", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20166", }, { cve: "CVE-2022-20167", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20167", }, { cve: "CVE-2022-20168", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20168", }, { cve: "CVE-2022-20169", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20169", }, { cve: "CVE-2022-20170", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20170", }, { cve: "CVE-2022-20171", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20171", }, { cve: "CVE-2022-20172", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20172", }, { cve: "CVE-2022-20173", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20173", }, { cve: "CVE-2022-20174", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20174", }, { cve: "CVE-2022-20175", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20175", }, { cve: "CVE-2022-20176", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20176", }, { cve: "CVE-2022-20177", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20177", }, { cve: "CVE-2022-20178", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20178", }, { cve: "CVE-2022-20179", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20179", }, { cve: "CVE-2022-20181", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20181", }, { cve: "CVE-2022-20182", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20182", }, { cve: "CVE-2022-20183", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20183", }, { cve: "CVE-2022-20184", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20184", }, { cve: "CVE-2022-20185", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20185", }, { cve: "CVE-2022-20186", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20186", }, { cve: "CVE-2022-20187", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20187", }, { cve: "CVE-2022-20188", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20188", }, { cve: "CVE-2022-20190", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20190", }, { cve: "CVE-2022-20191", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20191", }, { cve: "CVE-2022-20192", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20192", }, { cve: "CVE-2022-20193", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20193", }, { cve: "CVE-2022-20194", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20194", }, { cve: "CVE-2022-20195", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20195", }, { cve: "CVE-2022-20196", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20196", }, { cve: "CVE-2022-20197", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20197", }, { cve: "CVE-2022-20198", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20198", }, { cve: "CVE-2022-20200", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20200", }, { cve: "CVE-2022-20201", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20201", }, { cve: "CVE-2022-20202", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20202", }, { cve: "CVE-2022-20204", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20204", }, { cve: "CVE-2022-20205", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20205", }, { cve: "CVE-2022-20206", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20206", }, { cve: "CVE-2022-20207", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20207", }, { cve: "CVE-2022-20208", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20208", }, { cve: "CVE-2022-20209", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20209", }, { cve: "CVE-2022-20210", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20210", }, { cve: "CVE-2022-20233", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20233", }, { cve: "CVE-2022-21745", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-21745", }, { cve: "CVE-2022-22082", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-22082", }, { cve: "CVE-2022-22083", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-22083", }, { cve: "CVE-2022-22084", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-22084", }, { cve: "CVE-2022-22085", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-22085", }, { cve: "CVE-2022-22086", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-22086", }, { cve: "CVE-2022-22087", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-22087", }, { cve: "CVE-2022-22090", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-22090", }, { cve: "CVE-2022-23222", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-23222", }, { cve: "CVE-2022-24958", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-24958", }, { cve: "CVE-2022-25258", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-25258", }, { cve: "CVE-2022-26966", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-26966", }, ], }
wid-sec-w-2022-0853
Vulnerability from csaf_certbund
Published
2022-02-16 23:00
Modified
2024-02-07 23:00
Summary
Linux Kernel: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen nicht näher spezifizierten Angriff durchzuführen und beliebigen Code zur Ausführung zu bringen.
Betroffene Betriebssysteme
- UNIX
- Linux
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Der Kernel stellt den Kern des Linux Betriebssystems dar.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen nicht näher spezifizierten Angriff durchzuführen und beliebigen Code zur Ausführung zu bringen.", title: "Angriff", }, { category: "general", text: "- UNIX\n- Linux", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-0853 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0853.json", }, { category: "self", summary: "WID-SEC-2022-0853 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0853", }, { category: "external", summary: "Red Hat Bugzilla - Security Advisory vom 2022-02-16", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2055499", }, { category: "external", summary: "PoC - Security Advisory vom 2022-02-16", url: "https://github.com/x0reaxeax/exec-prot-bypass", }, { category: "external", summary: "PoC - Security Advisory vom 2022-02-16", url: "https://github.com/szymonh/d-os-descriptor", }, { category: "external", summary: "Red Hat Bugzilla - Security Advisory vom 2022-02-16", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2055502", }, { category: "external", summary: "Debian Security Advisory DSA-5092 vom 2022-03-07", url: "https://lists.debian.org/debian-security-announce/2022/msg00059.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:0759-1 vom 2022-03-09", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html", }, { category: "external", summary: "Debian Security Advisory DLA-2940 vom 2022-03-09", url: "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html", }, { category: "external", summary: "Debian Security Advisory DLA-2941 vom 2022-03-09", url: "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html", }, { category: "external", summary: "Debian Security Advisory DSA-5096 vom 2022-03-09", url: "https://lists.debian.org/debian-security-announce/2022/msg00063.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:1037-1 vom 2022-03-30", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010570.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:1038-1 vom 2022-03-30", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:1039-1 vom 2022-03-30", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:1257-1 vom 2022-04-19", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html", }, { category: "external", summary: "Ubuntu Security Notice USN-5417-1 vom 2022-05-12", url: "https://ubuntu.com/security/notices/USN-5417-1", }, { category: "external", summary: "Ubuntu Security Notice USN-5415-1 vom 2022-05-12", url: "https://ubuntu.com/security/notices/USN-5415-1", }, { category: "external", summary: "Ubuntu Security Notice USN-5418-1 vom 2022-05-12", url: "https://ubuntu.com/security/notices/USN-5418-1", }, { category: "external", summary: "Ubuntu Security Notice USN-5540-1 vom 2022-07-29", url: "https://ubuntu.com/security/notices/USN-5540-1", }, { category: "external", summary: "NetApp Security Advisory NTAP-20221028-0007 vom 2022-10-28", url: "https://security.netapp.com/advisory/ntap-20221028-0007/", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2023:2951 vom 2023-05-16", url: "https://access.redhat.com/errata/RHSA-2023:2951", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2023:2736 vom 2023-05-16", url: "https://access.redhat.com/errata/RHSA-2023:2736", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2023-2951 vom 2023-06-14", url: "https://oss.oracle.com/pipermail/el-errata/2023-June/014107.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:0724 vom 2024-02-07", url: "https://access.redhat.com/errata/RHSA-2024:0724", }, ], source_lang: "en-US", title: "Linux Kernel: Mehrere Schwachstellen", tracking: { current_release_date: "2024-02-07T23:00:00.000+00:00", generator: { date: "2024-08-15T17:32:29.465+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-0853", initial_release_date: "2022-02-16T23:00:00.000+00:00", revision_history: [ { date: "2022-02-16T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2022-03-07T23:00:00.000+00:00", number: "2", summary: "Neue Updates von Debian aufgenommen", }, { date: "2022-03-08T23:00:00.000+00:00", number: "3", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-03-09T23:00:00.000+00:00", number: "4", summary: "Neue Updates von Debian aufgenommen", }, { date: "2022-03-30T22:00:00.000+00:00", number: "5", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-04-19T22:00:00.000+00:00", number: "6", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-05-11T22:00:00.000+00:00", number: "7", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-07-28T22:00:00.000+00:00", number: "8", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-10-30T23:00:00.000+00:00", number: "9", summary: "Neue Updates von NetApp aufgenommen", }, { date: "2023-05-16T22:00:00.000+00:00", number: "10", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2023-06-13T22:00:00.000+00:00", number: "11", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2024-02-07T23:00:00.000+00:00", number: "12", summary: "Neue Updates von Red Hat aufgenommen", }, ], status: "final", version: "12", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "NetApp ActiveIQ Unified Manager", product: { name: "NetApp ActiveIQ Unified Manager", product_id: "T016960", product_identification_helper: { cpe: "cpe:/a:netapp:active_iq_unified_manager:-", }, }, }, ], category: "vendor", name: "NetApp", }, { branches: [ { branches: [ { category: "product_version_range", name: "<=5.16.10", product: { name: "Open Source Linux Kernel <=5.16.10", product_id: "T022090", }, }, ], category: "product_name", name: "Linux Kernel", }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Oracle Linux", product: { name: "Oracle Linux", product_id: "T004914", product_identification_helper: { cpe: "cpe:/o:oracle:linux:-", }, }, }, ], category: "vendor", name: "Oracle", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2022-25258", notes: [ { category: "description", text: "Es existiert eine Schwachstelle im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurde. Der Fehler besteht, weil das USB-Gadget-Subsystem bestimmte Validierungen von Interface-OS-Deskriptor-Anforderungen vermissen lässt, was zu Speicherbeschädigung führt. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen nicht spezifizierten Angriff auszuführen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T004914", "T016960", ], }, release_date: "2022-02-16T23:00:00.000+00:00", title: "CVE-2022-25258", }, { cve: "CVE-2022-25265", notes: [ { category: "description", text: "Es existiert eine Schwachstelle im Linux Kernel. Der Fehler besteht darin, dass bestimmte Binärdateien das exec-all-Attribut haben können, welches eine Ausführung von Bytes in vermeintlich nicht ausführbaren Bereichen einer Datei verursachen kann. Ein lokaler Angreifer kann diese Schwachstelle zur Ausführung von beliebigem Code ausnutzen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T022090", "T004914", "T016960", ], }, release_date: "2022-02-16T23:00:00.000+00:00", title: "CVE-2022-25265", }, ], }
WID-SEC-W-2022-0853
Vulnerability from csaf_certbund
Published
2022-02-16 23:00
Modified
2024-02-07 23:00
Summary
Linux Kernel: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen nicht näher spezifizierten Angriff durchzuführen und beliebigen Code zur Ausführung zu bringen.
Betroffene Betriebssysteme
- UNIX
- Linux
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Der Kernel stellt den Kern des Linux Betriebssystems dar.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen nicht näher spezifizierten Angriff durchzuführen und beliebigen Code zur Ausführung zu bringen.", title: "Angriff", }, { category: "general", text: "- UNIX\n- Linux", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-0853 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0853.json", }, { category: "self", summary: "WID-SEC-2022-0853 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0853", }, { category: "external", summary: "Red Hat Bugzilla - Security Advisory vom 2022-02-16", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2055499", }, { category: "external", summary: "PoC - Security Advisory vom 2022-02-16", url: "https://github.com/x0reaxeax/exec-prot-bypass", }, { category: "external", summary: "PoC - Security Advisory vom 2022-02-16", url: "https://github.com/szymonh/d-os-descriptor", }, { category: "external", summary: "Red Hat Bugzilla - Security Advisory vom 2022-02-16", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2055502", }, { category: "external", summary: "Debian Security Advisory DSA-5092 vom 2022-03-07", url: "https://lists.debian.org/debian-security-announce/2022/msg00059.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:0759-1 vom 2022-03-09", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html", }, { category: "external", summary: "Debian Security Advisory DLA-2940 vom 2022-03-09", url: "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html", }, { category: "external", summary: "Debian Security Advisory DLA-2941 vom 2022-03-09", url: "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html", }, { category: "external", summary: "Debian Security Advisory DSA-5096 vom 2022-03-09", url: "https://lists.debian.org/debian-security-announce/2022/msg00063.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:1037-1 vom 2022-03-30", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010570.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:1038-1 vom 2022-03-30", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:1039-1 vom 2022-03-30", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:1257-1 vom 2022-04-19", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html", }, { category: "external", summary: "Ubuntu Security Notice USN-5417-1 vom 2022-05-12", url: "https://ubuntu.com/security/notices/USN-5417-1", }, { category: "external", summary: "Ubuntu Security Notice USN-5415-1 vom 2022-05-12", url: "https://ubuntu.com/security/notices/USN-5415-1", }, { category: "external", summary: "Ubuntu Security Notice USN-5418-1 vom 2022-05-12", url: "https://ubuntu.com/security/notices/USN-5418-1", }, { category: "external", summary: "Ubuntu Security Notice USN-5540-1 vom 2022-07-29", url: "https://ubuntu.com/security/notices/USN-5540-1", }, { category: "external", summary: "NetApp Security Advisory NTAP-20221028-0007 vom 2022-10-28", url: "https://security.netapp.com/advisory/ntap-20221028-0007/", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2023:2951 vom 2023-05-16", url: "https://access.redhat.com/errata/RHSA-2023:2951", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2023:2736 vom 2023-05-16", url: "https://access.redhat.com/errata/RHSA-2023:2736", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2023-2951 vom 2023-06-14", url: "https://oss.oracle.com/pipermail/el-errata/2023-June/014107.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:0724 vom 2024-02-07", url: "https://access.redhat.com/errata/RHSA-2024:0724", }, ], source_lang: "en-US", title: "Linux Kernel: Mehrere Schwachstellen", tracking: { current_release_date: "2024-02-07T23:00:00.000+00:00", generator: { date: "2024-08-15T17:32:29.465+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-0853", initial_release_date: "2022-02-16T23:00:00.000+00:00", revision_history: [ { date: "2022-02-16T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2022-03-07T23:00:00.000+00:00", number: "2", summary: "Neue Updates von Debian aufgenommen", }, { date: "2022-03-08T23:00:00.000+00:00", number: "3", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-03-09T23:00:00.000+00:00", number: "4", summary: "Neue Updates von Debian aufgenommen", }, { date: "2022-03-30T22:00:00.000+00:00", number: "5", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-04-19T22:00:00.000+00:00", number: "6", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-05-11T22:00:00.000+00:00", number: "7", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-07-28T22:00:00.000+00:00", number: "8", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-10-30T23:00:00.000+00:00", number: "9", summary: "Neue Updates von NetApp aufgenommen", }, { date: "2023-05-16T22:00:00.000+00:00", number: "10", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2023-06-13T22:00:00.000+00:00", number: "11", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2024-02-07T23:00:00.000+00:00", number: "12", summary: "Neue Updates von Red Hat aufgenommen", }, ], status: "final", version: "12", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "NetApp ActiveIQ Unified Manager", product: { name: "NetApp ActiveIQ Unified Manager", product_id: "T016960", product_identification_helper: { cpe: "cpe:/a:netapp:active_iq_unified_manager:-", }, }, }, ], category: "vendor", name: "NetApp", }, { branches: [ { branches: [ { category: "product_version_range", name: "<=5.16.10", product: { name: "Open Source Linux Kernel <=5.16.10", product_id: "T022090", }, }, ], category: "product_name", name: "Linux Kernel", }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Oracle Linux", product: { name: "Oracle Linux", product_id: "T004914", product_identification_helper: { cpe: "cpe:/o:oracle:linux:-", }, }, }, ], category: "vendor", name: "Oracle", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2022-25258", notes: [ { category: "description", text: "Es existiert eine Schwachstelle im Linux Kernel, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurde. Der Fehler besteht, weil das USB-Gadget-Subsystem bestimmte Validierungen von Interface-OS-Deskriptor-Anforderungen vermissen lässt, was zu Speicherbeschädigung führt. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen nicht spezifizierten Angriff auszuführen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T004914", "T016960", ], }, release_date: "2022-02-16T23:00:00.000+00:00", title: "CVE-2022-25258", }, { cve: "CVE-2022-25265", notes: [ { category: "description", text: "Es existiert eine Schwachstelle im Linux Kernel. Der Fehler besteht darin, dass bestimmte Binärdateien das exec-all-Attribut haben können, welches eine Ausführung von Bytes in vermeintlich nicht ausführbaren Bereichen einer Datei verursachen kann. Ein lokaler Angreifer kann diese Schwachstelle zur Ausführung von beliebigem Code ausnutzen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T022090", "T004914", "T016960", ], }, release_date: "2022-02-16T23:00:00.000+00:00", title: "CVE-2022-25265", }, ], }
wid-sec-w-2022-0137
Vulnerability from csaf_certbund
Published
2022-06-06 22:00
Modified
2024-06-24 22:00
Summary
Android Patchday Juni 2022
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das Android Betriebssystem von Google ist eine quelloffene Plattform für mobile Geräte. Die Basis bildet der Linux-Kernel.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.
Betroffene Betriebssysteme
- Android
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Das Android Betriebssystem von Google ist eine quelloffene Plattform für mobile Geräte. Die Basis bildet der Linux-Kernel.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", title: "Angriff", }, { category: "general", text: "- Android", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-0137 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0137.json", }, { category: "self", summary: "WID-SEC-2022-0137 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0137", }, { category: "external", summary: "Android Security Advisory vom 2022-06-06", url: "https://source.android.com/security/bulletin/2022-06-01", }, { category: "external", summary: "Pixel Security Advisory vom 2022-06-06", url: "https://source.android.com/security/bulletin/pixel/2022-06-01", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2423-1 vom 2022-07-18", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011576.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2422-1 vom 2022-07-18", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011579.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2443-1 vom 2022-07-20", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011597.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2435-1 vom 2022-07-19", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011594.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2445-1 vom 2022-07-20", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011599.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2460-1 vom 2022-07-20", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011608.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2461-1 vom 2022-07-21", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011609.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2516-1 vom 2022-07-21", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011614.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2515-1 vom 2022-07-21", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011613.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2697-1 vom 2022-08-09", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011824.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2696-1 vom 2022-08-09", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011823.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2699-1 vom 2022-08-09", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011825.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2728-1 vom 2022-08-10", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011840.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2779-1 vom 2022-08-11", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011894.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2809-1 vom 2022-08-16", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:0412 vom 2024-01-25", url: "https://access.redhat.com/errata/RHSA-2024:0412", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:0856-1 vom 2024-03-13", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:2010-1 vom 2024-06-12", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018711.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALASKERNEL-5.4-2024-073 vom 2024-06-25", url: "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-073.html", }, ], source_lang: "en-US", title: "Android Patchday Juni 2022", tracking: { current_release_date: "2024-06-24T22:00:00.000+00:00", generator: { date: "2024-08-15T17:26:47.711+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-0137", initial_release_date: "2022-06-06T22:00:00.000+00:00", revision_history: [ { date: "2022-06-06T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2022-07-18T22:00:00.000+00:00", number: "2", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-07-19T22:00:00.000+00:00", number: "3", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-07-20T22:00:00.000+00:00", number: "4", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-07-21T22:00:00.000+00:00", number: "5", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-08-08T22:00:00.000+00:00", number: "6", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-08-09T22:00:00.000+00:00", number: "7", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-08-10T22:00:00.000+00:00", number: "8", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-08-15T22:00:00.000+00:00", number: "9", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-01-25T23:00:00.000+00:00", number: "10", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-03-12T23:00:00.000+00:00", number: "11", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-06-12T22:00:00.000+00:00", number: "12", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-06-24T22:00:00.000+00:00", number: "13", summary: "Neue Updates von Amazon aufgenommen", }, ], status: "final", version: "13", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { branches: [ { category: "product_version", name: "11", product: { name: "Google Android 11", product_id: "T017166", product_identification_helper: { cpe: "cpe:/o:google:android:11", }, }, }, { category: "product_version", name: "10", product: { name: "Google Android 10", product_id: "T019174", product_identification_helper: { cpe: "cpe:/o:google:android:10", }, }, }, { category: "product_version", name: "12", product: { name: "Google Android 12", product_id: "T020881", product_identification_helper: { cpe: "cpe:/o:google:android:12", }, }, }, { category: "product_version", name: "12L", product: { name: "Google Android 12L", product_id: "T023028", product_identification_helper: { cpe: "cpe:/o:google:android:12l", }, }, }, ], category: "product_name", name: "Android", }, ], category: "vendor", name: "Google", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, ], }, vulnerabilities: [ { cve: "CVE-2018-25020", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2018-25020", }, { cve: "CVE-2021-0983", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-0983", }, { cve: "CVE-2021-20268", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-20268", }, { cve: "CVE-2021-20321", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-20321", }, { cve: "CVE-2021-31440", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-31440", }, { cve: "CVE-2021-34556", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-34556", }, { cve: "CVE-2021-35083", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-35083", }, { cve: "CVE-2021-35102", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-35102", }, { cve: "CVE-2021-35111", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-35111", }, { cve: "CVE-2021-35118", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-35118", }, { cve: "CVE-2021-35119", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-35119", }, { cve: "CVE-2021-35120", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-35120", }, { cve: "CVE-2021-35121", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-35121", }, { cve: "CVE-2021-3635", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-3635", }, { cve: "CVE-2021-3715", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-3715", }, { cve: "CVE-2021-3743", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-3743", }, { cve: "CVE-2021-3753", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-3753", }, { cve: "CVE-2021-38160", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-38160", }, { cve: "CVE-2021-39624", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-39624", }, { cve: "CVE-2021-39653", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-39653", }, { cve: "CVE-2021-39691", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-39691", }, { cve: "CVE-2021-39806", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-39806", }, { cve: "CVE-2021-4154", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-4154", }, { cve: "CVE-2021-44733", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2021-44733", }, { cve: "CVE-2022-0492", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-0492", }, { cve: "CVE-2022-20006", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20006", }, { cve: "CVE-2022-20123", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20123", }, { cve: "CVE-2022-20124", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20124", }, { cve: "CVE-2022-20125", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20125", }, { cve: "CVE-2022-20126", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20126", }, { cve: "CVE-2022-20127", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20127", }, { cve: "CVE-2022-20129", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20129", }, { cve: "CVE-2022-20130", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20130", }, { cve: "CVE-2022-20131", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20131", }, { cve: "CVE-2022-20132", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20132", }, { cve: "CVE-2022-20133", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20133", }, { cve: "CVE-2022-20134", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20134", }, { cve: "CVE-2022-20135", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20135", }, { cve: "CVE-2022-20136", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20136", }, { cve: "CVE-2022-20137", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20137", }, { cve: "CVE-2022-20138", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20138", }, { cve: "CVE-2022-20139", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20139", }, { cve: "CVE-2022-20140", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20140", }, { cve: "CVE-2022-20141", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20141", }, { cve: "CVE-2022-20142", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20142", }, { cve: "CVE-2022-20143", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20143", }, { cve: "CVE-2022-20144", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20144", }, { cve: "CVE-2022-20145", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20145", }, { cve: "CVE-2022-20146", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20146", }, { cve: "CVE-2022-20147", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20147", }, { cve: "CVE-2022-20148", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20148", }, { cve: "CVE-2022-20149", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20149", }, { cve: "CVE-2022-20150", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20150", }, { cve: "CVE-2022-20151", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20151", }, { cve: "CVE-2022-20152", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20152", }, { cve: "CVE-2022-20153", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20153", }, { cve: "CVE-2022-20154", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20154", }, { cve: "CVE-2022-20155", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20155", }, { cve: "CVE-2022-20156", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20156", }, { cve: "CVE-2022-20157", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20157", }, { cve: "CVE-2022-20159", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20159", }, { cve: "CVE-2022-20160", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20160", }, { cve: "CVE-2022-20162", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20162", }, { cve: "CVE-2022-20164", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20164", }, { cve: "CVE-2022-20165", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20165", }, { cve: "CVE-2022-20166", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20166", }, { cve: "CVE-2022-20167", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20167", }, { cve: "CVE-2022-20168", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20168", }, { cve: "CVE-2022-20169", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20169", }, { cve: "CVE-2022-20170", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20170", }, { cve: "CVE-2022-20171", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20171", }, { cve: "CVE-2022-20172", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20172", }, { cve: "CVE-2022-20173", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20173", }, { cve: "CVE-2022-20174", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20174", }, { cve: "CVE-2022-20175", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20175", }, { cve: "CVE-2022-20176", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20176", }, { cve: "CVE-2022-20177", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20177", }, { cve: "CVE-2022-20178", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20178", }, { cve: "CVE-2022-20179", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20179", }, { cve: "CVE-2022-20181", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20181", }, { cve: "CVE-2022-20182", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20182", }, { cve: "CVE-2022-20183", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20183", }, { cve: "CVE-2022-20184", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20184", }, { cve: "CVE-2022-20185", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20185", }, { cve: "CVE-2022-20186", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20186", }, { cve: "CVE-2022-20187", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20187", }, { cve: "CVE-2022-20188", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20188", }, { cve: "CVE-2022-20190", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20190", }, { cve: "CVE-2022-20191", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20191", }, { cve: "CVE-2022-20192", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20192", }, { cve: "CVE-2022-20193", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20193", }, { cve: "CVE-2022-20194", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20194", }, { cve: "CVE-2022-20195", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20195", }, { cve: "CVE-2022-20196", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20196", }, { cve: "CVE-2022-20197", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20197", }, { cve: "CVE-2022-20198", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20198", }, { cve: "CVE-2022-20200", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20200", }, { cve: "CVE-2022-20201", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20201", }, { cve: "CVE-2022-20202", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20202", }, { cve: "CVE-2022-20204", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20204", }, { cve: "CVE-2022-20205", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20205", }, { cve: "CVE-2022-20206", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20206", }, { cve: "CVE-2022-20207", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20207", }, { cve: "CVE-2022-20208", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20208", }, { cve: "CVE-2022-20209", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20209", }, { cve: "CVE-2022-20210", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20210", }, { cve: "CVE-2022-20233", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-20233", }, { cve: "CVE-2022-21745", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-21745", }, { cve: "CVE-2022-22082", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-22082", }, { cve: "CVE-2022-22083", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-22083", }, { cve: "CVE-2022-22084", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-22084", }, { cve: "CVE-2022-22085", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-22085", }, { cve: "CVE-2022-22086", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-22086", }, { cve: "CVE-2022-22087", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-22087", }, { cve: "CVE-2022-22090", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-22090", }, { cve: "CVE-2022-23222", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-23222", }, { cve: "CVE-2022-24958", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-24958", }, { cve: "CVE-2022-25258", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-25258", }, { cve: "CVE-2022-26966", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Framework, Media Framework, System, Google Play System Updates, Kernel, MediaTek, Unisoc, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "T002207", "67646", "T023028", "398363", "T019174", "T020881", "T017166", ], }, release_date: "2022-06-06T22:00:00.000+00:00", title: "CVE-2022-26966", }, ], }
opensuse-su-2022:1037-1
Vulnerability from csaf_opensuse
Published
2022-03-30 07:37
Modified
2022-03-30 07:37
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-25636: Fixed an issue which allowed a local users to gain privileges because of a heap out-of-bounds write in nf_dup_netdev.c, related to nf_tables_offload (bsc#1196299).
- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could trigger crash the system or corrupt system memory (bsc#1196830).
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-24448: Fixed an issue if an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd(). (bsc#1196155)
- CVE-2022-25258: The USB Gadget subsystem lacked certain validation of interface OS descriptor requests, which could have lead to memory corruption (bsc#1196096).
- CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev->buf release (bsc#1195905).
- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free vulnerability in unix_scm_to_skb of af_unix (bsc#1193731).
- CVE-2021-39657: Fixed an information leak in the Universal Flash Storage subsystem (bsc#1193864).
The following non-security bugs were fixed:
- ALSA: intel_hdmi: Fix reference to PCM buffer address (git-fixes).
- ARM: 9182/1: mmu: fix returns from early_param() and __setup() functions (git-fixes).
- ARM: Fix kgdb breakpoint for Thumb2 (git-fixes).
- ASoC: cs4265: Fix the duplicated control name (git-fixes).
- ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min (git-fixes).
- ASoC: rt5668: do not block workqueue if card is unbound (git-fixes).
- ASoC: rt5682: do not block workqueue if card is unbound (git-fixes).
- Bluetooth: btusb: Add missing Chicony device for Realtek RTL8723BE (bsc#1196779).
- EDAC/altera: Fix deferred probing (bsc#1178134).
- HID: add mapping for KEY_ALL_APPLICATIONS (git-fixes).
- HID: add mapping for KEY_DICTATE (git-fixes).
- Hand over the maintainership to SLE15-SP3 maintainers
- IB/hfi1: Correct guard on eager buffer deallocation (git-fixes).
- IB/hfi1: Fix early init panic (git-fixes).
- IB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr (git-fixes).
- IB/hfi1: Insure use of smp_processor_id() is preempt disabled (git-fixes).
- IB/rdmavt: Validate remote_addr during loopback atomic tests (git-fixes).
- Input: clear BTN_RIGHT/MIDDLE on buttonpads (git-fixes).
- Input: elan_i2c - fix regulator enable count imbalance after suspend/resume (git-fixes).
- Input: elan_i2c - move regulator_[en|dis]able() out of elan_[en|dis]able_power() (git-fixes).
- RDMA/bnxt_re: Scan the whole bitmap when checking if 'disabling RCFW with pending cmd-bit' (git-fixes).
- RDMA/cma: Do not change route.addr.src_addr outside state checks (bsc#1181147).
- RDMA/cma: Let cma_resolve_ib_dev() continue search even after empty entry (git-fixes).
- RDMA/cma: Remove open coding of overflow checking for private_data_len (git-fixes).
- RDMA/core: Do not infoleak GRH fields (git-fixes).
- RDMA/core: Let ib_find_gid() continue search even after empty entry (git-fixes).
- RDMA/cxgb4: Set queue pair state when being queried (git-fixes).
- RDMA/hns: Validate the pkey index (git-fixes).
- RDMA/ib_srp: Fix a deadlock (git-fixes).
- RDMA/mlx4: Do not continue event handler after memory allocation failure (git-fixes).
- RDMA/rtrs-clt: Fix possible double free in error case (jsc#SLE-15176).
- RDMA/rxe: Fix a typo in opcode name (git-fixes).
- RDMA/siw: Fix broken RDMA Read Fence/Resume logic (git-fixes).
- RDMA/uverbs: Check for null return of kmalloc_array (git-fixes).
- RDMA/uverbs: Remove the unnecessary assignment (git-fixes).
- Revert 'USB: serial: ch341: add new Product ID for CH341A' (git-fixes).
- SUNRPC: avoid race between mod_timer() and del_timer_sync() (bnc#1195403).
- USB: gadget: validate endpoint index for xilinx udc (git-fixes).
- USB: gadget: validate interface OS descriptor requests (git-fixes).
- USB: hub: Clean up use of port initialization schemes and retries (git-fixes).
- USB: serial: option: add Telit LE910R1 compositions (git-fixes).
- USB: serial: option: add support for DW5829e (git-fixes).
- USB: zaurus: support another broken Zaurus (git-fixes).
- arm64: dts: rockchip: Switch RK3399-Gru DP to SPDIF output (git-fixes).
- asix: fix uninit-value in asix_mdio_read() (git-fixes).
- ata: pata_hpt37x: disable primary channel on HPT371 (git-fixes).
- batman-adv: Do not expect inter-netns unique iflink indices (git-fixes).
- batman-adv: Request iflink once in batadv-on-batadv check (git-fixes).
- batman-adv: Request iflink once in batadv_get_real_netdevice (git-fixes).
- blk-mq: do not free tags if the tag_set is used by other device in queue initialztion (bsc#1193787).
- bnxt_en: Fix active FEC reporting to ethtool (jsc#SLE-16649).
- bnxt_en: Fix incorrect multicast rx mask setting when not requested (git-fixes).
- bnxt_en: Fix occasional ethtool -t loopback test failures (git-fixes).
- bnxt_en: Fix offline ethtool selftest with RDMA enabled (git-fixes).
- bonding: force carrier update when releasing slave (git-fixes).
- can: gs_usb: change active_channels's type from atomic_t to u8 (git-fixes).
- cgroup-v1: Correct privileges check in release_agent writes (bsc#1196723).
- cgroup/cpuset: Fix 'suspicious RCU usage' lockdep warning (bsc#1196868).
- clk: jz4725b: fix mmc0 clock gating (git-fixes).
- cpufreq: schedutil: Use kobject release() method to free (git-fixes)
- cpuset: Fix the bug that subpart_cpus updated wrongly in update_cpumask() (bsc#1196866).
- cputime, cpuacct: Include guest time in user time in (git-fixes)
- dma-direct: Fix potential NULL pointer dereference (bsc#1196472 ltc#192278).
- dma-mapping: Allow mixing bypass and mapped DMA operation (bsc#1196472 ltc#192278).
- dmaengine: shdma: Fix runtime PM imbalance on error (git-fixes).
- drm/amdgpu: disable MMHUB PG for Picasso (git-fixes).
- drm/edid: Always set RGB444 (git-fixes).
- drm/i915/dg1: Wait for pcode/uncore handshake at startup (bsc#1195211).
- drm/i915/gen11+: Only load DRAM information from pcode (bsc#1195211).
- drm/i915: Nuke not needed members of dram_info (bsc#1195211).
- drm/i915: Remove memory frequency calculation (bsc#1195211).
- drm/i915: Rename is_16gb_dimm to wm_lv_0_adjust_needed (bsc#1195211).
- efivars: Respect 'block' flag in efivar_entry_set_safe() (git-fixes).
- exfat: fix i_blocks for files truncated over 4 GiB (git-fixes).
- exfat: fix incorrect loading of i_blocks for large files (git-fixes).
- firmware: arm_scmi: Remove space in MODULE_ALIAS name (git-fixes).
- gpio: rockchip: Reset int_bothedge when changing trigger (git-fixes).
- gpio: tegra186: Fix chip_data type confusion (git-fixes).
- gtp: remove useless rcu_read_lock() (git-fixes).
- hamradio: fix macro redefine warning (git-fixes).
- i2c: bcm2835: Avoid clock stretching timeouts (git-fixes).
- iavf: Fix missing check for running netdev (git-fixes).
- ice: initialize local variable 'tlv' (jsc#SLE-12878).
- igc: igc_read_phy_reg_gpy: drop premature return (git-fixes).
- igc: igc_write_phy_reg_gpy: drop premature return (git-fixes).
- iio: Fix error handling for PM (git-fixes).
- iio: adc: ad7124: fix mask used for setting AIN_BUFP & AIN_BUFM bits (git-fixes).
- iio: adc: men_z188_adc: Fix a resource leak in an error handling path (git-fixes).
- ixgbe: xsk: change !netif_carrier_ok() handling in ixgbe_xmit_zc() (git-fixes).
- mac80211: fix forwarded mesh frames AC & queue selection (git-fixes).
- mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work (git-fixes).
- mac80211_hwsim: report NOACK frames in tx_status (git-fixes).
- mask out added spinlock in rndis_params (git-fixes).
- net/mlx5: Fix possible deadlock on rule deletion (git-fixes).
- net/mlx5: Fix wrong limitation of metadata match on ecpf (git-fixes).
- net/mlx5: Update the list of the PCI supported devices (git-fixes).
- net/mlx5: Update the list of the PCI supported devices (git-fixes).
- net/mlx5e: Fix modify header actions memory leak (git-fixes).
- net/mlx5e: Fix page DMA map/unmap attributes (bsc#1196468).
- net/mlx5e: Fix wrong return value on ioctl EEPROM query failure (git-fixes).
- net/mlx5e: TC, Reject rules with drop and modify hdr action (git-fixes).
- net/mlx5e: TC, Reject rules with forward and drop actions (git-fixes).
- net/mlx5e: kTLS, Use CHECKSUM_UNNECESSARY for device-offloaded packets (jsc#SLE-15172).
- net/sched: act_ct: Fix flow table lookup after ct clear or switching zones (jsc#SLE-15172).
- net: dsa: mv88e6xxx: MV88E6097 does not support jumbo configuration (git-fixes).
- net: ethernet: ti: cpsw: disable PTPv1 hw timestamping advertisement (git-fixes).
- net: fix up skbs delta_truesize in UDP GRO frag_list (bsc#1176447).
- net: hns3: Clear the CMDQ registers before unmapping BAR region (git-fixes).
- net: sfc: Replace in_interrupt() usage (git-fixes).
- net: tipc: validate domain record count on input (bsc#1195254).
- net: usb: cdc_mbim: avoid altsetting toggling for Telit FN990 (git-fixes).
- netfilter: nf_tables: fix memory leak during stateful obj update (bsc#1176447).
- netsec: ignore 'phy-mode' device property on ACPI systems (git-fixes).
- nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() (git-fixes).
- nl80211: Handle nla_memdup failures in handle_nan_filter (git-fixes).
- ntb: intel: fix port config status offset for SPR (git-fixes).
- nvme-multipath: use vmalloc for ANA log buffer (bsc#1193787).
- nvme-rdma: fix possible use-after-free in transport error_recovery work (git-fixes).
- nvme-tcp: fix possible use-after-free in transport error_recovery work (git-fixes).
- nvme: fix a possible use-after-free in controller reset during load (git-fixes).
- powerpc/dma: Fallback to dma_ops when persistent memory present (bsc#1196472 ltc#192278). Update config files.
- powerpc/fadump: register for fadump as early as possible (bsc#1179439 ltc#190038).
- powerpc/mm: Remove dcache flush from memory remove (bsc#1196433 ltc#196449).
- powerpc/powernv/memtrace: Fix dcache flushing (bsc#1196433 ltc#196449).
- powerpc/pseries/iommu: Fix window size for direct mapping with pmem (bsc#1196472 ltc#192278).
- sched/core: Mitigate race (git-fixes)
- scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() (git-fixes).
- scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe (git-fixes).
- scsi: lpfc: Terminate string in lpfc_debugfs_nvmeio_trc_write() (git-fixes).
- scsi: nsp_cs: Check of ioremap return value (git-fixes).
- scsi: qedf: Fix potential dereference of NULL pointer (git-fixes).
- scsi: smartpqi: Add PCI IDs (bsc#1196627).
- scsi: ufs: Fix race conditions related to driver data (git-fixes).
- selftests: mlxsw: tc_police_scale: Make test more robust (bsc#1176774).
- soc: fsl: Correct MAINTAINERS database (QUICC ENGINE LIBRARY) (git-fixes).
- soc: fsl: Correct MAINTAINERS database (SOC) (git-fixes).
- soc: fsl: qe: Check of ioremap return value (git-fixes).
- spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op() (git-fixes).
- sr9700: sanity check for packet length (bsc#1196836).
- tracing: Fix return value of __setup handlers (git-fixes).
- tty: n_gsm: fix encoding of control signal octet bit DV (git-fixes).
- tty: n_gsm: fix proper link termination after failed open (git-fixes).
- usb: dwc2: use well defined macros for power_down (git-fixes).
- usb: dwc3: gadget: Let the interrupt handler disable bottom halves (git-fixes).
- usb: dwc3: pci: Fix Bay Trail phy GPIO mappings (git-fixes).
- usb: gadget: rndis: add spinlock for rndis response list (git-fixes).
- usb: hub: Fix usb enumeration issue due to address0 race (git-fixes).
- vrf: Fix fast path output packet handling with async Netfilter rules (git-fixes).
- xhci: Prevent futile URB re-submissions due to incorrect return value (git-fixes).
- xhci: re-initialize the HC during resume if HCE was set (git-fixes).
Patchnames
openSUSE-SLE-15.3-2022-1037
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-25636: Fixed an issue which allowed a local users to gain privileges because of a heap out-of-bounds write in nf_dup_netdev.c, related to nf_tables_offload (bsc#1196299).\n- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could trigger crash the system or corrupt system memory (bsc#1196830).\n- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).\n- CVE-2022-24448: Fixed an issue if an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).\n- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)\n- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd(). (bsc#1196155)\n- CVE-2022-25258: The USB Gadget subsystem lacked certain validation of interface OS descriptor requests, which could have lead to memory corruption (bsc#1196096).\n- CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev->buf release (bsc#1195905).\n- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).\n- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).\n- CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free vulnerability in unix_scm_to_skb of af_unix (bsc#1193731).\n- CVE-2021-39657: Fixed an information leak in the Universal Flash Storage subsystem (bsc#1193864).\n\nThe following non-security bugs were fixed:\n\n- ALSA: intel_hdmi: Fix reference to PCM buffer address (git-fixes).\n- ARM: 9182/1: mmu: fix returns from early_param() and __setup() functions (git-fixes).\n- ARM: Fix kgdb breakpoint for Thumb2 (git-fixes).\n- ASoC: cs4265: Fix the duplicated control name (git-fixes).\n- ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min (git-fixes).\n- ASoC: rt5668: do not block workqueue if card is unbound (git-fixes).\n- ASoC: rt5682: do not block workqueue if card is unbound (git-fixes).\n- Bluetooth: btusb: Add missing Chicony device for Realtek RTL8723BE (bsc#1196779).\n- EDAC/altera: Fix deferred probing (bsc#1178134).\n- HID: add mapping for KEY_ALL_APPLICATIONS (git-fixes).\n- HID: add mapping for KEY_DICTATE (git-fixes).\n- Hand over the maintainership to SLE15-SP3 maintainers\n- IB/hfi1: Correct guard on eager buffer deallocation (git-fixes).\n- IB/hfi1: Fix early init panic (git-fixes).\n- IB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr (git-fixes).\n- IB/hfi1: Insure use of smp_processor_id() is preempt disabled (git-fixes).\n- IB/rdmavt: Validate remote_addr during loopback atomic tests (git-fixes).\n- Input: clear BTN_RIGHT/MIDDLE on buttonpads (git-fixes).\n- Input: elan_i2c - fix regulator enable count imbalance after suspend/resume (git-fixes).\n- Input: elan_i2c - move regulator_[en|dis]able() out of elan_[en|dis]able_power() (git-fixes).\n- RDMA/bnxt_re: Scan the whole bitmap when checking if 'disabling RCFW with pending cmd-bit' (git-fixes).\n- RDMA/cma: Do not change route.addr.src_addr outside state checks (bsc#1181147).\n- RDMA/cma: Let cma_resolve_ib_dev() continue search even after empty entry (git-fixes).\n- RDMA/cma: Remove open coding of overflow checking for private_data_len (git-fixes).\n- RDMA/core: Do not infoleak GRH fields (git-fixes).\n- RDMA/core: Let ib_find_gid() continue search even after empty entry (git-fixes).\n- RDMA/cxgb4: Set queue pair state when being queried (git-fixes).\n- RDMA/hns: Validate the pkey index (git-fixes).\n- RDMA/ib_srp: Fix a deadlock (git-fixes).\n- RDMA/mlx4: Do not continue event handler after memory allocation failure (git-fixes).\n- RDMA/rtrs-clt: Fix possible double free in error case (jsc#SLE-15176).\n- RDMA/rxe: Fix a typo in opcode name (git-fixes).\n- RDMA/siw: Fix broken RDMA Read Fence/Resume logic (git-fixes).\n- RDMA/uverbs: Check for null return of kmalloc_array (git-fixes).\n- RDMA/uverbs: Remove the unnecessary assignment (git-fixes).\n- Revert 'USB: serial: ch341: add new Product ID for CH341A' (git-fixes).\n- SUNRPC: avoid race between mod_timer() and del_timer_sync() (bnc#1195403).\n- USB: gadget: validate endpoint index for xilinx udc (git-fixes).\n- USB: gadget: validate interface OS descriptor requests (git-fixes).\n- USB: hub: Clean up use of port initialization schemes and retries (git-fixes).\n- USB: serial: option: add Telit LE910R1 compositions (git-fixes).\n- USB: serial: option: add support for DW5829e (git-fixes).\n- USB: zaurus: support another broken Zaurus (git-fixes).\n- arm64: dts: rockchip: Switch RK3399-Gru DP to SPDIF output (git-fixes).\n- asix: fix uninit-value in asix_mdio_read() (git-fixes).\n- ata: pata_hpt37x: disable primary channel on HPT371 (git-fixes).\n- batman-adv: Do not expect inter-netns unique iflink indices (git-fixes).\n- batman-adv: Request iflink once in batadv-on-batadv check (git-fixes).\n- batman-adv: Request iflink once in batadv_get_real_netdevice (git-fixes).\n- blk-mq: do not free tags if the tag_set is used by other device in queue initialztion (bsc#1193787).\n- bnxt_en: Fix active FEC reporting to ethtool (jsc#SLE-16649).\n- bnxt_en: Fix incorrect multicast rx mask setting when not requested (git-fixes).\n- bnxt_en: Fix occasional ethtool -t loopback test failures (git-fixes).\n- bnxt_en: Fix offline ethtool selftest with RDMA enabled (git-fixes).\n- bonding: force carrier update when releasing slave (git-fixes).\n- can: gs_usb: change active_channels's type from atomic_t to u8 (git-fixes).\n- cgroup-v1: Correct privileges check in release_agent writes (bsc#1196723).\n- cgroup/cpuset: Fix 'suspicious RCU usage' lockdep warning (bsc#1196868).\n- clk: jz4725b: fix mmc0 clock gating (git-fixes).\n- cpufreq: schedutil: Use kobject release() method to free (git-fixes)\n- cpuset: Fix the bug that subpart_cpus updated wrongly in update_cpumask() (bsc#1196866).\n- cputime, cpuacct: Include guest time in user time in (git-fixes)\n- dma-direct: Fix potential NULL pointer dereference (bsc#1196472 ltc#192278).\n- dma-mapping: Allow mixing bypass and mapped DMA operation (bsc#1196472 ltc#192278).\n- dmaengine: shdma: Fix runtime PM imbalance on error (git-fixes).\n- drm/amdgpu: disable MMHUB PG for Picasso (git-fixes).\n- drm/edid: Always set RGB444 (git-fixes).\n- drm/i915/dg1: Wait for pcode/uncore handshake at startup (bsc#1195211).\n- drm/i915/gen11+: Only load DRAM information from pcode (bsc#1195211).\n- drm/i915: Nuke not needed members of dram_info (bsc#1195211).\n- drm/i915: Remove memory frequency calculation (bsc#1195211).\n- drm/i915: Rename is_16gb_dimm to wm_lv_0_adjust_needed (bsc#1195211).\n- efivars: Respect 'block' flag in efivar_entry_set_safe() (git-fixes).\n- exfat: fix i_blocks for files truncated over 4 GiB (git-fixes).\n- exfat: fix incorrect loading of i_blocks for large files (git-fixes).\n- firmware: arm_scmi: Remove space in MODULE_ALIAS name (git-fixes).\n- gpio: rockchip: Reset int_bothedge when changing trigger (git-fixes).\n- gpio: tegra186: Fix chip_data type confusion (git-fixes).\n- gtp: remove useless rcu_read_lock() (git-fixes).\n- hamradio: fix macro redefine warning (git-fixes).\n- i2c: bcm2835: Avoid clock stretching timeouts (git-fixes).\n- iavf: Fix missing check for running netdev (git-fixes).\n- ice: initialize local variable 'tlv' (jsc#SLE-12878).\n- igc: igc_read_phy_reg_gpy: drop premature return (git-fixes).\n- igc: igc_write_phy_reg_gpy: drop premature return (git-fixes).\n- iio: Fix error handling for PM (git-fixes).\n- iio: adc: ad7124: fix mask used for setting AIN_BUFP & AIN_BUFM bits (git-fixes).\n- iio: adc: men_z188_adc: Fix a resource leak in an error handling path (git-fixes).\n- ixgbe: xsk: change !netif_carrier_ok() handling in ixgbe_xmit_zc() (git-fixes).\n- mac80211: fix forwarded mesh frames AC & queue selection (git-fixes).\n- mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work (git-fixes).\n- mac80211_hwsim: report NOACK frames in tx_status (git-fixes).\n- mask out added spinlock in rndis_params (git-fixes).\n- net/mlx5: Fix possible deadlock on rule deletion (git-fixes).\n- net/mlx5: Fix wrong limitation of metadata match on ecpf (git-fixes).\n- net/mlx5: Update the list of the PCI supported devices (git-fixes).\n- net/mlx5: Update the list of the PCI supported devices (git-fixes).\n- net/mlx5e: Fix modify header actions memory leak (git-fixes).\n- net/mlx5e: Fix page DMA map/unmap attributes (bsc#1196468).\n- net/mlx5e: Fix wrong return value on ioctl EEPROM query failure (git-fixes).\n- net/mlx5e: TC, Reject rules with drop and modify hdr action (git-fixes).\n- net/mlx5e: TC, Reject rules with forward and drop actions (git-fixes).\n- net/mlx5e: kTLS, Use CHECKSUM_UNNECESSARY for device-offloaded packets (jsc#SLE-15172).\n- net/sched: act_ct: Fix flow table lookup after ct clear or switching zones (jsc#SLE-15172).\n- net: dsa: mv88e6xxx: MV88E6097 does not support jumbo configuration (git-fixes).\n- net: ethernet: ti: cpsw: disable PTPv1 hw timestamping advertisement (git-fixes).\n- net: fix up skbs delta_truesize in UDP GRO frag_list (bsc#1176447).\n- net: hns3: Clear the CMDQ registers before unmapping BAR region (git-fixes).\n- net: sfc: Replace in_interrupt() usage (git-fixes).\n- net: tipc: validate domain record count on input (bsc#1195254).\n- net: usb: cdc_mbim: avoid altsetting toggling for Telit FN990 (git-fixes).\n- netfilter: nf_tables: fix memory leak during stateful obj update (bsc#1176447).\n- netsec: ignore 'phy-mode' device property on ACPI systems (git-fixes).\n- nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() (git-fixes).\n- nl80211: Handle nla_memdup failures in handle_nan_filter (git-fixes).\n- ntb: intel: fix port config status offset for SPR (git-fixes).\n- nvme-multipath: use vmalloc for ANA log buffer (bsc#1193787).\n- nvme-rdma: fix possible use-after-free in transport error_recovery work (git-fixes).\n- nvme-tcp: fix possible use-after-free in transport error_recovery work (git-fixes).\n- nvme: fix a possible use-after-free in controller reset during load (git-fixes).\n- powerpc/dma: Fallback to dma_ops when persistent memory present (bsc#1196472 ltc#192278). Update config files.\n- powerpc/fadump: register for fadump as early as possible (bsc#1179439 ltc#190038).\n- powerpc/mm: Remove dcache flush from memory remove (bsc#1196433 ltc#196449).\n- powerpc/powernv/memtrace: Fix dcache flushing (bsc#1196433 ltc#196449).\n- powerpc/pseries/iommu: Fix window size for direct mapping with pmem (bsc#1196472 ltc#192278).\n- sched/core: Mitigate race (git-fixes)\n- scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() (git-fixes).\n- scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe (git-fixes).\n- scsi: lpfc: Terminate string in lpfc_debugfs_nvmeio_trc_write() (git-fixes).\n- scsi: nsp_cs: Check of ioremap return value (git-fixes).\n- scsi: qedf: Fix potential dereference of NULL pointer (git-fixes).\n- scsi: smartpqi: Add PCI IDs (bsc#1196627).\n- scsi: ufs: Fix race conditions related to driver data (git-fixes).\n- selftests: mlxsw: tc_police_scale: Make test more robust (bsc#1176774).\n- soc: fsl: Correct MAINTAINERS database (QUICC ENGINE LIBRARY) (git-fixes).\n- soc: fsl: Correct MAINTAINERS database (SOC) (git-fixes).\n- soc: fsl: qe: Check of ioremap return value (git-fixes).\n- spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op() (git-fixes).\n- sr9700: sanity check for packet length (bsc#1196836).\n- tracing: Fix return value of __setup handlers (git-fixes).\n- tty: n_gsm: fix encoding of control signal octet bit DV (git-fixes).\n- tty: n_gsm: fix proper link termination after failed open (git-fixes).\n- usb: dwc2: use well defined macros for power_down (git-fixes).\n- usb: dwc3: gadget: Let the interrupt handler disable bottom halves (git-fixes).\n- usb: dwc3: pci: Fix Bay Trail phy GPIO mappings (git-fixes).\n- usb: gadget: rndis: add spinlock for rndis response list (git-fixes).\n- usb: hub: Fix usb enumeration issue due to address0 race (git-fixes).\n- vrf: Fix fast path output packet handling with async Netfilter rules (git-fixes).\n- xhci: Prevent futile URB re-submissions due to incorrect return value (git-fixes).\n- xhci: re-initialize the HC during resume if HCE was set (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "openSUSE-SLE-15.3-2022-1037", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_1037-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2022:1037-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVOKHN5NCU57OGTEBU36WJRTWHRBUST7/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2022:1037-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVOKHN5NCU57OGTEBU36WJRTWHRBUST7/", }, { category: "self", summary: "SUSE Bug 1176447", url: "https://bugzilla.suse.com/1176447", }, { category: "self", summary: "SUSE Bug 1176774", url: "https://bugzilla.suse.com/1176774", }, { category: "self", summary: "SUSE Bug 1178134", url: "https://bugzilla.suse.com/1178134", }, { category: "self", summary: "SUSE Bug 1179439", url: "https://bugzilla.suse.com/1179439", }, { category: "self", summary: "SUSE Bug 1181147", url: "https://bugzilla.suse.com/1181147", }, { category: "self", summary: "SUSE Bug 1191428", url: "https://bugzilla.suse.com/1191428", }, { category: "self", summary: "SUSE Bug 1192273", url: "https://bugzilla.suse.com/1192273", }, { category: "self", summary: "SUSE Bug 1193731", url: "https://bugzilla.suse.com/1193731", }, { category: "self", summary: "SUSE Bug 1193787", url: "https://bugzilla.suse.com/1193787", }, { category: "self", summary: "SUSE Bug 1193864", url: "https://bugzilla.suse.com/1193864", }, { category: "self", summary: "SUSE Bug 1194463", url: "https://bugzilla.suse.com/1194463", }, { category: "self", summary: "SUSE Bug 1194516", url: "https://bugzilla.suse.com/1194516", }, { category: "self", summary: "SUSE Bug 1195211", url: "https://bugzilla.suse.com/1195211", }, { category: "self", summary: "SUSE Bug 1195254", url: "https://bugzilla.suse.com/1195254", }, { category: "self", summary: "SUSE Bug 1195403", url: "https://bugzilla.suse.com/1195403", }, { category: "self", summary: "SUSE Bug 1195612", url: "https://bugzilla.suse.com/1195612", }, { category: "self", summary: "SUSE Bug 1195897", url: "https://bugzilla.suse.com/1195897", }, { category: "self", summary: "SUSE Bug 1195905", url: "https://bugzilla.suse.com/1195905", }, { category: "self", summary: "SUSE Bug 1195939", url: "https://bugzilla.suse.com/1195939", }, { category: "self", summary: "SUSE Bug 1195949", url: "https://bugzilla.suse.com/1195949", }, { category: "self", summary: "SUSE Bug 1195987", url: "https://bugzilla.suse.com/1195987", }, { category: "self", summary: "SUSE Bug 1196079", url: "https://bugzilla.suse.com/1196079", }, { category: "self", summary: "SUSE Bug 1196095", url: "https://bugzilla.suse.com/1196095", }, { category: "self", summary: "SUSE Bug 1196132", url: "https://bugzilla.suse.com/1196132", }, { category: "self", summary: "SUSE Bug 1196155", url: "https://bugzilla.suse.com/1196155", }, { category: "self", summary: "SUSE Bug 1196299", url: "https://bugzilla.suse.com/1196299", }, { category: "self", summary: "SUSE Bug 1196301", url: "https://bugzilla.suse.com/1196301", }, { category: "self", summary: "SUSE Bug 1196433", url: "https://bugzilla.suse.com/1196433", }, { category: "self", summary: "SUSE Bug 1196468", url: "https://bugzilla.suse.com/1196468", }, { category: "self", summary: "SUSE Bug 1196472", url: "https://bugzilla.suse.com/1196472", }, { category: "self", summary: "SUSE Bug 1196627", url: "https://bugzilla.suse.com/1196627", }, { category: "self", summary: "SUSE Bug 1196723", url: "https://bugzilla.suse.com/1196723", }, { category: "self", summary: "SUSE Bug 1196779", url: "https://bugzilla.suse.com/1196779", }, { category: "self", summary: "SUSE Bug 1196830", url: "https://bugzilla.suse.com/1196830", }, { category: "self", summary: "SUSE Bug 1196836", url: "https://bugzilla.suse.com/1196836", }, { category: "self", summary: "SUSE Bug 1196866", url: "https://bugzilla.suse.com/1196866", }, { category: "self", summary: "SUSE Bug 1196868", url: "https://bugzilla.suse.com/1196868", }, { category: "self", summary: "SUSE CVE CVE-2021-0920 page", url: "https://www.suse.com/security/cve/CVE-2021-0920/", }, { category: "self", summary: "SUSE CVE CVE-2021-39657 page", url: "https://www.suse.com/security/cve/CVE-2021-39657/", }, { category: "self", summary: "SUSE CVE CVE-2021-44879 page", url: "https://www.suse.com/security/cve/CVE-2021-44879/", }, { category: "self", summary: "SUSE CVE CVE-2022-0487 page", url: "https://www.suse.com/security/cve/CVE-2022-0487/", }, { category: "self", summary: "SUSE CVE CVE-2022-0617 page", url: "https://www.suse.com/security/cve/CVE-2022-0617/", }, { category: "self", summary: "SUSE CVE CVE-2022-0644 page", url: "https://www.suse.com/security/cve/CVE-2022-0644/", }, { category: "self", summary: "SUSE CVE CVE-2022-24448 page", url: "https://www.suse.com/security/cve/CVE-2022-24448/", }, { category: "self", summary: "SUSE CVE CVE-2022-24958 page", url: "https://www.suse.com/security/cve/CVE-2022-24958/", }, { category: "self", summary: "SUSE CVE CVE-2022-24959 page", url: "https://www.suse.com/security/cve/CVE-2022-24959/", }, { category: "self", summary: "SUSE CVE CVE-2022-25258 page", url: "https://www.suse.com/security/cve/CVE-2022-25258/", }, { category: "self", summary: "SUSE CVE CVE-2022-25636 page", url: "https://www.suse.com/security/cve/CVE-2022-25636/", }, { category: "self", summary: "SUSE CVE CVE-2022-26490 page", url: "https://www.suse.com/security/cve/CVE-2022-26490/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2022-03-30T07:37:00Z", generator: { date: "2022-03-30T07:37:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2022:1037-1", initial_release_date: "2022-03-30T07:37:00Z", revision_history: [ { date: "2022-03-30T07:37:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-azure-5.3.18-150300.38.50.1.noarch", product: { name: "kernel-devel-azure-5.3.18-150300.38.50.1.noarch", product_id: "kernel-devel-azure-5.3.18-150300.38.50.1.noarch", }, }, { category: "product_version", name: "kernel-source-azure-5.3.18-150300.38.50.1.noarch", product: { name: "kernel-source-azure-5.3.18-150300.38.50.1.noarch", product_id: "kernel-source-azure-5.3.18-150300.38.50.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", product: { name: "cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", product_id: "cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", product: { name: "dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", product_id: "dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", product: { name: "gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", product_id: "gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-5.3.18-150300.38.50.1.x86_64", product: { name: "kernel-azure-5.3.18-150300.38.50.1.x86_64", product_id: "kernel-azure-5.3.18-150300.38.50.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", product: { name: "kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", product_id: "kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", product: { name: "kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", product_id: "kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", product: { name: "kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", product_id: "kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", product: { name: "kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", product_id: "kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", product: { name: "kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", product_id: "kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", product: { name: "kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", product_id: "kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", product: { name: "ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", product_id: "ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", product: { name: "reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", product_id: "reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.3", product: { name: "openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", }, product_reference: "cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", }, product_reference: "dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", }, product_reference: "gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-5.3.18-150300.38.50.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", }, product_reference: "kernel-azure-5.3.18-150300.38.50.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.3.18-150300.38.50.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", }, product_reference: "kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-extra-5.3.18-150300.38.50.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", }, product_reference: "kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", }, product_reference: "kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-optional-5.3.18-150300.38.50.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", }, product_reference: "kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-5.3.18-150300.38.50.1.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", }, product_reference: "kernel-devel-azure-5.3.18-150300.38.50.1.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-5.3.18-150300.38.50.1.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", }, product_reference: "kernel-source-azure-5.3.18-150300.38.50.1.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.3.18-150300.38.50.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", }, product_reference: "kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", }, product_reference: "kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", }, product_reference: "ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", }, product_reference: "reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, ], }, vulnerabilities: [ { cve: "CVE-2021-0920", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-0920", }, ], notes: [ { category: "general", text: "In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-0920", url: "https://www.suse.com/security/cve/CVE-2021-0920", }, { category: "external", summary: "SUSE Bug 1193731 for CVE-2021-0920", url: "https://bugzilla.suse.com/1193731", }, { category: "external", summary: "SUSE Bug 1194463 for CVE-2021-0920", url: "https://bugzilla.suse.com/1194463", }, { category: "external", summary: "SUSE Bug 1195939 for CVE-2021-0920", url: "https://bugzilla.suse.com/1195939", }, { category: "external", summary: "SUSE Bug 1199255 for CVE-2021-0920", url: "https://bugzilla.suse.com/1199255", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2021-0920", url: "https://bugzilla.suse.com/1200084", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:00Z", details: "important", }, ], title: "CVE-2021-0920", }, { cve: "CVE-2021-39657", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39657", }, ], notes: [ { category: "general", text: "In ufshcd_eh_device_reset_handler of ufshcd.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-194696049References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39657", url: "https://www.suse.com/security/cve/CVE-2021-39657", }, { category: "external", summary: "SUSE Bug 1193864 for CVE-2021-39657", url: "https://bugzilla.suse.com/1193864", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:00Z", details: "low", }, ], title: "CVE-2021-39657", }, { cve: "CVE-2021-44879", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-44879", }, ], notes: [ { category: "general", text: "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-44879", url: "https://www.suse.com/security/cve/CVE-2021-44879", }, { category: "external", summary: "SUSE Bug 1195987 for CVE-2021-44879", url: "https://bugzilla.suse.com/1195987", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:00Z", details: "moderate", }, ], title: "CVE-2021-44879", }, { cve: "CVE-2022-0487", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0487", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0487", url: "https://www.suse.com/security/cve/CVE-2022-0487", }, { category: "external", summary: "SUSE Bug 1194516 for CVE-2022-0487", url: "https://bugzilla.suse.com/1194516", }, { category: "external", summary: "SUSE Bug 1195949 for CVE-2022-0487", url: "https://bugzilla.suse.com/1195949", }, { category: "external", summary: "SUSE Bug 1198615 for CVE-2022-0487", url: "https://bugzilla.suse.com/1198615", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:00Z", details: "moderate", }, ], title: "CVE-2022-0487", }, { cve: "CVE-2022-0617", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0617", }, ], notes: [ { category: "general", text: "A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0617", url: "https://www.suse.com/security/cve/CVE-2022-0617", }, { category: "external", summary: "SUSE Bug 1196079 for CVE-2022-0617", url: "https://bugzilla.suse.com/1196079", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:00Z", details: "moderate", }, ], title: "CVE-2022-0617", }, { cve: "CVE-2022-0644", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0644", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0644", url: "https://www.suse.com/security/cve/CVE-2022-0644", }, { category: "external", summary: "SUSE Bug 1196155 for CVE-2022-0644", url: "https://bugzilla.suse.com/1196155", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:00Z", details: "moderate", }, ], title: "CVE-2022-0644", }, { cve: "CVE-2022-24448", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-24448", }, ], notes: [ { category: "general", text: "An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-24448", url: "https://www.suse.com/security/cve/CVE-2022-24448", }, { category: "external", summary: "SUSE Bug 1195612 for CVE-2022-24448", url: "https://bugzilla.suse.com/1195612", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:00Z", details: "moderate", }, ], title: "CVE-2022-24448", }, { cve: "CVE-2022-24958", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-24958", }, ], notes: [ { category: "general", text: "drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev->buf release.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-24958", url: "https://www.suse.com/security/cve/CVE-2022-24958", }, { category: "external", summary: "SUSE Bug 1195905 for CVE-2022-24958", url: "https://bugzilla.suse.com/1195905", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:00Z", details: "moderate", }, ], title: "CVE-2022-24958", }, { cve: "CVE-2022-24959", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-24959", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-24959", url: "https://www.suse.com/security/cve/CVE-2022-24959", }, { category: "external", summary: "SUSE Bug 1195897 for CVE-2022-24959", url: "https://bugzilla.suse.com/1195897", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:00Z", details: "moderate", }, ], title: "CVE-2022-24959", }, { cve: "CVE-2022-25258", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-25258", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-25258", url: "https://www.suse.com/security/cve/CVE-2022-25258", }, { category: "external", summary: "SUSE Bug 1196095 for CVE-2022-25258", url: "https://bugzilla.suse.com/1196095", }, { category: "external", summary: "SUSE Bug 1196132 for CVE-2022-25258", url: "https://bugzilla.suse.com/1196132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:00Z", details: "important", }, ], title: "CVE-2022-25258", }, { cve: "CVE-2022-25636", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-25636", }, ], notes: [ { category: "general", text: "net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows local users to gain privileges because of a heap out-of-bounds write. This is related to nf_tables_offload.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-25636", url: "https://www.suse.com/security/cve/CVE-2022-25636", }, { category: "external", summary: "SUSE Bug 1196299 for CVE-2022-25636", url: "https://bugzilla.suse.com/1196299", }, { category: "external", summary: "SUSE Bug 1196301 for CVE-2022-25636", url: "https://bugzilla.suse.com/1196301", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:00Z", details: "important", }, ], title: "CVE-2022-25636", }, { cve: "CVE-2022-26490", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-26490", }, ], notes: [ { category: "general", text: "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-26490", url: "https://www.suse.com/security/cve/CVE-2022-26490", }, { category: "external", summary: "SUSE Bug 1196830 for CVE-2022-26490", url: "https://bugzilla.suse.com/1196830", }, { category: "external", summary: "SUSE Bug 1201656 for CVE-2022-26490", url: "https://bugzilla.suse.com/1201656", }, { category: "external", summary: "SUSE Bug 1201969 for CVE-2022-26490", url: "https://bugzilla.suse.com/1201969", }, { category: "external", summary: "SUSE Bug 1211495 for CVE-2022-26490", url: "https://bugzilla.suse.com/1211495", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.50.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.50.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:37:00Z", details: "important", }, ], title: "CVE-2022-26490", }, ], }
opensuse-su-2022:1039-1
Vulnerability from csaf_opensuse
Published
2022-03-30 07:38
Modified
2022-03-30 07:38
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-25636: Fixed an issue which allowed a local users to gain privileges because of a heap out-of-bounds write in nf_dup_netdev.c, related to nf_tables_offload (bsc#1196299).
- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could trigger crash the system or corrupt system memory (bsc#1196830).
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-24448: Fixed an issue if an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd(). (bsc#1196155)
- CVE-2022-25258: The USB Gadget subsystem lacked certain validation of interface OS descriptor requests, which could have lead to memory corruption (bsc#1196096).
- CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev->buf release (bsc#1195905).
- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free vulnerability in unix_scm_to_skb of af_unix (bsc#1193731).
- CVE-2021-39657: Fixed an information leak in the Universal Flash Storage subsystem (bsc#1193864).
- CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which allowed attackers to obtain sensitive information from heap memory via crafted frame lengths from a device (bsc#1196836).
- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)
- CVE-2021-45402: The check_alu_op function in kernel/bpf/verifier.c did not properly update bounds while handling the mov32 instruction, which allowed local users to obtain potentially sensitive address information (bsc#1196130).
- CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers. (bsc#1196488)
The following non-security bugs were fixed:
- ALSA: intel_hdmi: Fix reference to PCM buffer address (git-fixes).
- ARM: 9182/1: mmu: fix returns from early_param() and __setup() functions (git-fixes).
- ARM: Fix kgdb breakpoint for Thumb2 (git-fixes).
- ASoC: cs4265: Fix the duplicated control name (git-fixes).
- ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min (git-fixes).
- ASoC: rt5668: do not block workqueue if card is unbound (git-fixes).
- ASoC: rt5682: do not block workqueue if card is unbound (git-fixes).
- Bluetooth: btusb: Add missing Chicony device for Realtek RTL8723BE (bsc#1196779).
- EDAC/altera: Fix deferred probing (bsc#1178134).
- EDAC: Fix calculation of returned address and next offset in edac_align_ptr() (bsc#1178134).
- HID: add mapping for KEY_ALL_APPLICATIONS (git-fixes).
- HID: add mapping for KEY_DICTATE (git-fixes).
- Hand over the maintainership to SLE15-SP3 maintainers
- IB/hfi1: Correct guard on eager buffer deallocation (git-fixes).
- IB/hfi1: Fix early init panic (git-fixes).
- IB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr (git-fixes).
- IB/hfi1: Insure use of smp_processor_id() is preempt disabled (git-fixes).
- IB/rdmavt: Validate remote_addr during loopback atomic tests (git-fixes).
- Input: clear BTN_RIGHT/MIDDLE on buttonpads (git-fixes).
- Input: elan_i2c - fix regulator enable count imbalance after suspend/resume (git-fixes).
- Input: elan_i2c - move regulator_[en|dis]able() out of elan_[en|dis]able_power() (git-fixes).
- NFC: port100: fix use-after-free in port100_send_complete (git-fixes).
- RDMA/bnxt_re: Scan the whole bitmap when checking if 'disabling RCFW with pending cmd-bit' (git-fixes).
- RDMA/cma: Do not change route.addr.src_addr outside state checks (bsc#1181147).
- RDMA/cma: Let cma_resolve_ib_dev() continue search even after empty entry (git-fixes).
- RDMA/cma: Remove open coding of overflow checking for private_data_len (git-fixes).
- RDMA/core: Do not infoleak GRH fields (git-fixes).
- RDMA/core: Let ib_find_gid() continue search even after empty entry (git-fixes).
- RDMA/cxgb4: Set queue pair state when being queried (git-fixes).
- RDMA/hns: Validate the pkey index (git-fixes).
- RDMA/ib_srp: Fix a deadlock (git-fixes).
- RDMA/mlx4: Do not continue event handler after memory allocation failure (git-fixes).
- RDMA/rtrs-clt: Fix possible double free in error case (jsc#SLE-15176).
- RDMA/rxe: Fix a typo in opcode name (git-fixes).
- RDMA/siw: Fix broken RDMA Read Fence/Resume logic (git-fixes).
- RDMA/uverbs: Check for null return of kmalloc_array (git-fixes).
- RDMA/uverbs: Remove the unnecessary assignment (git-fixes).
- Revert 'USB: serial: ch341: add new Product ID for CH341A' (git-fixes).
- SUNRPC: avoid race between mod_timer() and del_timer_sync() (bnc#1195403).
- USB: gadget: validate endpoint index for xilinx udc (git-fixes).
- USB: gadget: validate interface OS descriptor requests (git-fixes).
- USB: hub: Clean up use of port initialization schemes and retries (git-fixes).
- USB: serial: option: add Telit LE910R1 compositions (git-fixes).
- USB: serial: option: add support for DW5829e (git-fixes).
- USB: zaurus: support another broken Zaurus (git-fixes).
- arm64: dts: rockchip: Switch RK3399-Gru DP to SPDIF output (git-fixes).
- asix: fix uninit-value in asix_mdio_read() (git-fixes).
- ata: pata_hpt37x: disable primary channel on HPT371 (git-fixes).
- ax25: Fix NULL pointer dereference in ax25_kill_by_device (git-fixes).
- batman-adv: Do not expect inter-netns unique iflink indices (git-fixes).
- batman-adv: Request iflink once in batadv-on-batadv check (git-fixes).
- batman-adv: Request iflink once in batadv_get_real_netdevice (git-fixes).
- blk-mq: do not free tags if the tag_set is used by other device in queue initialztion (bsc#1193787).
- bnxt_en: Fix active FEC reporting to ethtool (jsc#SLE-16649).
- bnxt_en: Fix incorrect multicast rx mask setting when not requested (git-fixes).
- bnxt_en: Fix occasional ethtool -t loopback test failures (git-fixes).
- bnxt_en: Fix offline ethtool selftest with RDMA enabled (git-fixes).
- bonding: force carrier update when releasing slave (git-fixes).
- build initrd without systemd This reduces the size of the initrd by over 25%, which improves startup time of the virtual machine by 0.5-0.6s on very fast machines, more on slower ones.
- can: gs_usb: change active_channels's type from atomic_t to u8 (git-fixes).
- cgroup-v1: Correct privileges check in release_agent writes (bsc#1196723).
- cgroup/cpuset: Fix 'suspicious RCU usage' lockdep warning (bsc#1196868).
- clk: jz4725b: fix mmc0 clock gating (git-fixes).
- constraints: Also adjust disk requirement for x86 and s390.
- constraints: Increase disk space for aarch64
- cpufreq: schedutil: Use kobject release() method to free (git-fixes)
- cpuset: Fix the bug that subpart_cpus updated wrongly in update_cpumask() (bsc#1196866).
- cputime, cpuacct: Include guest time in user time in (git-fixes)
- dma-direct: Fix potential NULL pointer dereference (bsc#1196472 ltc#192278).
- dma-mapping: Allow mixing bypass and mapped DMA operation (bsc#1196472 ltc#192278).
- dmaengine: shdma: Fix runtime PM imbalance on error (git-fixes).
- drm/amdgpu: disable MMHUB PG for Picasso (git-fixes).
- drm/edid: Always set RGB444 (git-fixes).
- drm/i915/dg1: Wait for pcode/uncore handshake at startup (bsc#1195211).
- drm/i915/gen11+: Only load DRAM information from pcode (bsc#1195211).
- drm/i915: Nuke not needed members of dram_info (bsc#1195211).
- drm/i915: Remove memory frequency calculation (bsc#1195211).
- drm/i915: Rename is_16gb_dimm to wm_lv_0_adjust_needed (bsc#1195211).
- drm/sun4i: mixer: Fix P010 and P210 format numbers (git-fixes).
- efivars: Respect 'block' flag in efivar_entry_set_safe() (git-fixes).
- exfat: fix i_blocks for files truncated over 4 GiB (git-fixes).
- exfat: fix incorrect loading of i_blocks for large files (git-fixes).
- firmware: arm_scmi: Remove space in MODULE_ALIAS name (git-fixes).
- fix rpm build warning tumbleweed rpm is adding these warnings to the log: It's not recommended to have unversioned Obsoletes: Obsoletes: microcode_ctl
- gianfar: ethtool: Fix refcount leak in gfar_get_ts_info (git-fixes).
- gpio: rockchip: Reset int_bothedge when changing trigger (git-fixes).
- gpio: tegra186: Fix chip_data type confusion (git-fixes).
- gpio: ts4900: Do not set DAT and OE together (git-fixes).
- gpiolib: acpi: Convert ACPI value of debounce to microseconds (git-fixes).
- gtp: remove useless rcu_read_lock() (git-fixes).
- hamradio: fix macro redefine warning (git-fixes).
- i2c: bcm2835: Avoid clock stretching timeouts (git-fixes).
- iavf: Fix missing check for running netdev (git-fixes).
- ice: initialize local variable 'tlv' (jsc#SLE-12878).
- igc: igc_read_phy_reg_gpy: drop premature return (git-fixes).
- igc: igc_write_phy_reg_gpy: drop premature return (git-fixes).
- iio: Fix error handling for PM (git-fixes).
- iio: adc: ad7124: fix mask used for setting AIN_BUFP & AIN_BUFM bits (git-fixes).
- iio: adc: men_z188_adc: Fix a resource leak in an error handling path (git-fixes).
- ixgbe: xsk: change !netif_carrier_ok() handling in ixgbe_xmit_zc() (git-fixes).
- kernel-binary.spec.in: Move 20-kernel-default-extra.conf to the correctr directory (bsc#1195051).
- kernel-binary.spec: Also exclude the kernel signing key from devel package. There is a check in OBS that fails when it is included. Also the key is not reproducible. Fixes: bb988d4625a3 ('kernel-binary: Do not include sourcedir in certificate path.')
- kernel-binary.spec: Do not use the default certificate path (bsc#1194943). Using the the default path is broken since Linux 5.17
- kernel-binary: Do not include sourcedir in certificate path. The certs macro runs before build directory is set up so it creates the aggregate of supplied certificates in the source directory. Using this file directly as the certificate in kernel config works but embeds the source directory path in the kernel config. To avoid this symlink the certificate to the build directory and use relative path to refer to it. Also fabricate a certificate in the same location in build directory when none is provided.
- kernel-obs-build: include 9p (boo#1195353) To be able to share files between host and the qemu vm of the build script, the 9p and 9p_virtio kernel modules need to be included in the initrd of kernel-obs-build.
- mac80211: fix forwarded mesh frames AC & queue selection (git-fixes).
- mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work (git-fixes).
- mac80211_hwsim: report NOACK frames in tx_status (git-fixes).
- mask out added spinlock in rndis_params (git-fixes).
- mmc: meson: Fix usage of meson_mmc_post_req() (git-fixes).
- net/mlx5: Fix possible deadlock on rule deletion (git-fixes).
- net/mlx5: Fix wrong limitation of metadata match on ecpf (git-fixes).
- net/mlx5: Update the list of the PCI supported devices (git-fixes).
- net/mlx5: Update the list of the PCI supported devices (git-fixes).
- net/mlx5e: Fix modify header actions memory leak (git-fixes).
- net/mlx5e: Fix page DMA map/unmap attributes (bsc#1196468).
- net/mlx5e: Fix wrong return value on ioctl EEPROM query failure (git-fixes).
- net/mlx5e: TC, Reject rules with drop and modify hdr action (git-fixes).
- net/mlx5e: TC, Reject rules with forward and drop actions (git-fixes).
- net/mlx5e: kTLS, Use CHECKSUM_UNNECESSARY for device-offloaded packets (jsc#SLE-15172).
- net/sched: act_ct: Fix flow table lookup after ct clear or switching zones (jsc#SLE-15172).
- net: dsa: mv88e6xxx: MV88E6097 does not support jumbo configuration (git-fixes).
- net: ethernet: ti: cpsw: disable PTPv1 hw timestamping advertisement (git-fixes).
- net: fix up skbs delta_truesize in UDP GRO frag_list (bsc#1176447).
- net: hns3: Clear the CMDQ registers before unmapping BAR region (git-fixes).
- net: phy: DP83822: clear MISR2 register to disable interrupts (git-fixes).
- net: sfc: Replace in_interrupt() usage (git-fixes).
- net: tipc: validate domain record count on input (bsc#1195254).
- net: usb: cdc_mbim: avoid altsetting toggling for Telit FN990 (git-fixes).
- netfilter: nf_tables: fix memory leak during stateful obj update (bsc#1176447).
- netsec: ignore 'phy-mode' device property on ACPI systems (git-fixes).
- nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() (git-fixes).
- nl80211: Handle nla_memdup failures in handle_nan_filter (git-fixes).
- ntb: intel: fix port config status offset for SPR (git-fixes).
- nvme-multipath: use vmalloc for ANA log buffer (bsc#1193787).
- nvme-rdma: fix possible use-after-free in transport error_recovery work (git-fixes).
- nvme-tcp: fix possible use-after-free in transport error_recovery work (git-fixes).
- nvme: fix a possible use-after-free in controller reset during load (git-fixes).
- powerpc/dma: Fallback to dma_ops when persistent memory present (bsc#1196472 ltc#192278). Update config files.
- powerpc/fadump: register for fadump as early as possible (bsc#1179439 ltc#190038).
- powerpc/mm: Remove dcache flush from memory remove (bsc#1196433 ltc#196449).
- powerpc/powernv/memtrace: Fix dcache flushing (bsc#1196433 ltc#196449).
- powerpc/pseries/iommu: Fix window size for direct mapping with pmem (bsc#1196472 ltc#192278).
- rpm/*.spec.in: Use https:// urls
- rpm/arch-symbols,guards,*driver: Replace Novell with SUSE.
- rpm/check-for-config-changes: Ignore PAHOLE_VERSION.
- rpm/kernel-docs.spec.in: use %%license for license declarations Limited to SLE15+ to avoid compatibility nightmares.
- rpm/kernel-source.spec.in: call fdupes per subpackage It is a waste of time to do a global fdupes when we have subpackages.
- rpm: SC2006: Use $(...) notation instead of legacy backticked `...`.
- sched/core: Mitigate race (git-fixes)
- scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() (git-fixes).
- scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe (git-fixes).
- scsi: lpfc: Terminate string in lpfc_debugfs_nvmeio_trc_write() (git-fixes).
- scsi: nsp_cs: Check of ioremap return value (git-fixes).
- scsi: qedf: Fix potential dereference of NULL pointer (git-fixes).
- scsi: smartpqi: Add PCI IDs (bsc#1196627).
- scsi: ufs: Fix race conditions related to driver data (git-fixes).
- selftests: mlxsw: tc_police_scale: Make test more robust (bsc#1176774).
- soc: fsl: Correct MAINTAINERS database (QUICC ENGINE LIBRARY) (git-fixes).
- soc: fsl: Correct MAINTAINERS database (SOC) (git-fixes).
- soc: fsl: qe: Check of ioremap return value (git-fixes).
- spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op() (git-fixes).
- sr9700: sanity check for packet length (bsc#1196836).
- staging: gdm724x: fix use after free in gdm_lte_rx() (git-fixes).
- tracing: Fix return value of __setup handlers (git-fixes).
- tty: n_gsm: fix encoding of control signal octet bit DV (git-fixes).
- tty: n_gsm: fix proper link termination after failed open (git-fixes).
- usb: dwc2: Fix Stalling a Non-Isochronous OUT EP (git-fixes).
- usb: dwc2: gadget: Fix GOUTNAK flow for Slave mode (git-fixes).
- usb: dwc2: gadget: Fix kill_all_requests race (git-fixes).
- usb: dwc2: use well defined macros for power_down (git-fixes).
- usb: dwc3: gadget: Let the interrupt handler disable bottom halves (git-fixes).
- usb: dwc3: meson-g12a: Disable the regulator in the error handling path of the probe (git-fixes).
- usb: dwc3: pci: Fix Bay Trail phy GPIO mappings (git-fixes).
- usb: gadget: rndis: add spinlock for rndis response list (git-fixes).
- usb: host: xen-hcd: add missing unlock in error path (git-fixes).
- usb: hub: Fix locking issues with address0_mutex (git-fixes).
- usb: hub: Fix usb enumeration issue due to address0 race (git-fixes).
- vrf: Fix fast path output packet handling with async Netfilter rules (git-fixes).
- xen/usb: do not use gnttab_end_foreign_access() in xenhcd_gnttab_done() (bsc#1196488, XSA-396).
- xhci: Prevent futile URB re-submissions due to incorrect return value (git-fixes).
- xhci: re-initialize the HC during resume if HCE was set (git-fixes).
Patchnames
openSUSE-SLE-15.3-2022-1039,openSUSE-SLE-15.4-2022-1039
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-25636: Fixed an issue which allowed a local users to gain privileges because of a heap out-of-bounds write in nf_dup_netdev.c, related to nf_tables_offload (bsc#1196299).\n- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could trigger crash the system or corrupt system memory (bsc#1196830).\n- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).\n- CVE-2022-24448: Fixed an issue if an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).\n- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)\n- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd(). (bsc#1196155)\n- CVE-2022-25258: The USB Gadget subsystem lacked certain validation of interface OS descriptor requests, which could have lead to memory corruption (bsc#1196096).\n- CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev->buf release (bsc#1195905).\n- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).\n- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).\n- CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free vulnerability in unix_scm_to_skb of af_unix (bsc#1193731).\n- CVE-2021-39657: Fixed an information leak in the Universal Flash Storage subsystem (bsc#1193864).\n- CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which allowed attackers to obtain sensitive information from heap memory via crafted frame lengths from a device (bsc#1196836).\n- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)\n- CVE-2021-45402: The check_alu_op function in kernel/bpf/verifier.c did not properly update bounds while handling the mov32 instruction, which allowed local users to obtain potentially sensitive address information (bsc#1196130).\n- CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers. (bsc#1196488)\n\nThe following non-security bugs were fixed:\n\n- ALSA: intel_hdmi: Fix reference to PCM buffer address (git-fixes).\n- ARM: 9182/1: mmu: fix returns from early_param() and __setup() functions (git-fixes).\n- ARM: Fix kgdb breakpoint for Thumb2 (git-fixes).\n- ASoC: cs4265: Fix the duplicated control name (git-fixes).\n- ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min (git-fixes).\n- ASoC: rt5668: do not block workqueue if card is unbound (git-fixes).\n- ASoC: rt5682: do not block workqueue if card is unbound (git-fixes).\n- Bluetooth: btusb: Add missing Chicony device for Realtek RTL8723BE (bsc#1196779).\n- EDAC/altera: Fix deferred probing (bsc#1178134).\n- EDAC: Fix calculation of returned address and next offset in edac_align_ptr() (bsc#1178134).\n- HID: add mapping for KEY_ALL_APPLICATIONS (git-fixes).\n- HID: add mapping for KEY_DICTATE (git-fixes).\n- Hand over the maintainership to SLE15-SP3 maintainers\n- IB/hfi1: Correct guard on eager buffer deallocation (git-fixes).\n- IB/hfi1: Fix early init panic (git-fixes).\n- IB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr (git-fixes).\n- IB/hfi1: Insure use of smp_processor_id() is preempt disabled (git-fixes).\n- IB/rdmavt: Validate remote_addr during loopback atomic tests (git-fixes).\n- Input: clear BTN_RIGHT/MIDDLE on buttonpads (git-fixes).\n- Input: elan_i2c - fix regulator enable count imbalance after suspend/resume (git-fixes).\n- Input: elan_i2c - move regulator_[en|dis]able() out of elan_[en|dis]able_power() (git-fixes).\n- NFC: port100: fix use-after-free in port100_send_complete (git-fixes).\n- RDMA/bnxt_re: Scan the whole bitmap when checking if 'disabling RCFW with pending cmd-bit' (git-fixes).\n- RDMA/cma: Do not change route.addr.src_addr outside state checks (bsc#1181147).\n- RDMA/cma: Let cma_resolve_ib_dev() continue search even after empty entry (git-fixes).\n- RDMA/cma: Remove open coding of overflow checking for private_data_len (git-fixes).\n- RDMA/core: Do not infoleak GRH fields (git-fixes).\n- RDMA/core: Let ib_find_gid() continue search even after empty entry (git-fixes).\n- RDMA/cxgb4: Set queue pair state when being queried (git-fixes).\n- RDMA/hns: Validate the pkey index (git-fixes).\n- RDMA/ib_srp: Fix a deadlock (git-fixes).\n- RDMA/mlx4: Do not continue event handler after memory allocation failure (git-fixes).\n- RDMA/rtrs-clt: Fix possible double free in error case (jsc#SLE-15176).\n- RDMA/rxe: Fix a typo in opcode name (git-fixes).\n- RDMA/siw: Fix broken RDMA Read Fence/Resume logic (git-fixes).\n- RDMA/uverbs: Check for null return of kmalloc_array (git-fixes).\n- RDMA/uverbs: Remove the unnecessary assignment (git-fixes).\n- Revert 'USB: serial: ch341: add new Product ID for CH341A' (git-fixes).\n- SUNRPC: avoid race between mod_timer() and del_timer_sync() (bnc#1195403).\n- USB: gadget: validate endpoint index for xilinx udc (git-fixes).\n- USB: gadget: validate interface OS descriptor requests (git-fixes).\n- USB: hub: Clean up use of port initialization schemes and retries (git-fixes).\n- USB: serial: option: add Telit LE910R1 compositions (git-fixes).\n- USB: serial: option: add support for DW5829e (git-fixes).\n- USB: zaurus: support another broken Zaurus (git-fixes).\n- arm64: dts: rockchip: Switch RK3399-Gru DP to SPDIF output (git-fixes).\n- asix: fix uninit-value in asix_mdio_read() (git-fixes).\n- ata: pata_hpt37x: disable primary channel on HPT371 (git-fixes).\n- ax25: Fix NULL pointer dereference in ax25_kill_by_device (git-fixes).\n- batman-adv: Do not expect inter-netns unique iflink indices (git-fixes).\n- batman-adv: Request iflink once in batadv-on-batadv check (git-fixes).\n- batman-adv: Request iflink once in batadv_get_real_netdevice (git-fixes).\n- blk-mq: do not free tags if the tag_set is used by other device in queue initialztion (bsc#1193787).\n- bnxt_en: Fix active FEC reporting to ethtool (jsc#SLE-16649).\n- bnxt_en: Fix incorrect multicast rx mask setting when not requested (git-fixes).\n- bnxt_en: Fix occasional ethtool -t loopback test failures (git-fixes).\n- bnxt_en: Fix offline ethtool selftest with RDMA enabled (git-fixes).\n- bonding: force carrier update when releasing slave (git-fixes).\n- build initrd without systemd This reduces the size of the initrd by over 25%, which improves startup time of the virtual machine by 0.5-0.6s on very fast machines, more on slower ones.\n- can: gs_usb: change active_channels's type from atomic_t to u8 (git-fixes).\n- cgroup-v1: Correct privileges check in release_agent writes (bsc#1196723).\n- cgroup/cpuset: Fix 'suspicious RCU usage' lockdep warning (bsc#1196868).\n- clk: jz4725b: fix mmc0 clock gating (git-fixes).\n- constraints: Also adjust disk requirement for x86 and s390.\n- constraints: Increase disk space for aarch64\n- cpufreq: schedutil: Use kobject release() method to free (git-fixes)\n- cpuset: Fix the bug that subpart_cpus updated wrongly in update_cpumask() (bsc#1196866).\n- cputime, cpuacct: Include guest time in user time in (git-fixes)\n- dma-direct: Fix potential NULL pointer dereference (bsc#1196472 ltc#192278).\n- dma-mapping: Allow mixing bypass and mapped DMA operation (bsc#1196472 ltc#192278).\n- dmaengine: shdma: Fix runtime PM imbalance on error (git-fixes).\n- drm/amdgpu: disable MMHUB PG for Picasso (git-fixes).\n- drm/edid: Always set RGB444 (git-fixes).\n- drm/i915/dg1: Wait for pcode/uncore handshake at startup (bsc#1195211).\n- drm/i915/gen11+: Only load DRAM information from pcode (bsc#1195211).\n- drm/i915: Nuke not needed members of dram_info (bsc#1195211).\n- drm/i915: Remove memory frequency calculation (bsc#1195211).\n- drm/i915: Rename is_16gb_dimm to wm_lv_0_adjust_needed (bsc#1195211).\n- drm/sun4i: mixer: Fix P010 and P210 format numbers (git-fixes).\n- efivars: Respect 'block' flag in efivar_entry_set_safe() (git-fixes).\n- exfat: fix i_blocks for files truncated over 4 GiB (git-fixes).\n- exfat: fix incorrect loading of i_blocks for large files (git-fixes).\n- firmware: arm_scmi: Remove space in MODULE_ALIAS name (git-fixes).\n- fix rpm build warning tumbleweed rpm is adding these warnings to the log: It's not recommended to have unversioned Obsoletes: Obsoletes: microcode_ctl\n- gianfar: ethtool: Fix refcount leak in gfar_get_ts_info (git-fixes).\n- gpio: rockchip: Reset int_bothedge when changing trigger (git-fixes).\n- gpio: tegra186: Fix chip_data type confusion (git-fixes).\n- gpio: ts4900: Do not set DAT and OE together (git-fixes).\n- gpiolib: acpi: Convert ACPI value of debounce to microseconds (git-fixes).\n- gtp: remove useless rcu_read_lock() (git-fixes).\n- hamradio: fix macro redefine warning (git-fixes).\n- i2c: bcm2835: Avoid clock stretching timeouts (git-fixes).\n- iavf: Fix missing check for running netdev (git-fixes).\n- ice: initialize local variable 'tlv' (jsc#SLE-12878).\n- igc: igc_read_phy_reg_gpy: drop premature return (git-fixes).\n- igc: igc_write_phy_reg_gpy: drop premature return (git-fixes).\n- iio: Fix error handling for PM (git-fixes).\n- iio: adc: ad7124: fix mask used for setting AIN_BUFP & AIN_BUFM bits (git-fixes).\n- iio: adc: men_z188_adc: Fix a resource leak in an error handling path (git-fixes).\n- ixgbe: xsk: change !netif_carrier_ok() handling in ixgbe_xmit_zc() (git-fixes).\n- kernel-binary.spec.in: Move 20-kernel-default-extra.conf to the correctr directory (bsc#1195051).\n- kernel-binary.spec: Also exclude the kernel signing key from devel package. There is a check in OBS that fails when it is included. Also the key is not reproducible. Fixes: bb988d4625a3 ('kernel-binary: Do not include sourcedir in certificate path.')\n- kernel-binary.spec: Do not use the default certificate path (bsc#1194943). Using the the default path is broken since Linux 5.17\n- kernel-binary: Do not include sourcedir in certificate path. The certs macro runs before build directory is set up so it creates the aggregate of supplied certificates in the source directory. Using this file directly as the certificate in kernel config works but embeds the source directory path in the kernel config. To avoid this symlink the certificate to the build directory and use relative path to refer to it. Also fabricate a certificate in the same location in build directory when none is provided.\n- kernel-obs-build: include 9p (boo#1195353) To be able to share files between host and the qemu vm of the build script, the 9p and 9p_virtio kernel modules need to be included in the initrd of kernel-obs-build.\n- mac80211: fix forwarded mesh frames AC & queue selection (git-fixes).\n- mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work (git-fixes).\n- mac80211_hwsim: report NOACK frames in tx_status (git-fixes).\n- mask out added spinlock in rndis_params (git-fixes).\n- mmc: meson: Fix usage of meson_mmc_post_req() (git-fixes).\n- net/mlx5: Fix possible deadlock on rule deletion (git-fixes).\n- net/mlx5: Fix wrong limitation of metadata match on ecpf (git-fixes).\n- net/mlx5: Update the list of the PCI supported devices (git-fixes).\n- net/mlx5: Update the list of the PCI supported devices (git-fixes).\n- net/mlx5e: Fix modify header actions memory leak (git-fixes).\n- net/mlx5e: Fix page DMA map/unmap attributes (bsc#1196468).\n- net/mlx5e: Fix wrong return value on ioctl EEPROM query failure (git-fixes).\n- net/mlx5e: TC, Reject rules with drop and modify hdr action (git-fixes).\n- net/mlx5e: TC, Reject rules with forward and drop actions (git-fixes).\n- net/mlx5e: kTLS, Use CHECKSUM_UNNECESSARY for device-offloaded packets (jsc#SLE-15172).\n- net/sched: act_ct: Fix flow table lookup after ct clear or switching zones (jsc#SLE-15172).\n- net: dsa: mv88e6xxx: MV88E6097 does not support jumbo configuration (git-fixes).\n- net: ethernet: ti: cpsw: disable PTPv1 hw timestamping advertisement (git-fixes).\n- net: fix up skbs delta_truesize in UDP GRO frag_list (bsc#1176447).\n- net: hns3: Clear the CMDQ registers before unmapping BAR region (git-fixes).\n- net: phy: DP83822: clear MISR2 register to disable interrupts (git-fixes).\n- net: sfc: Replace in_interrupt() usage (git-fixes).\n- net: tipc: validate domain record count on input (bsc#1195254).\n- net: usb: cdc_mbim: avoid altsetting toggling for Telit FN990 (git-fixes).\n- netfilter: nf_tables: fix memory leak during stateful obj update (bsc#1176447).\n- netsec: ignore 'phy-mode' device property on ACPI systems (git-fixes).\n- nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() (git-fixes).\n- nl80211: Handle nla_memdup failures in handle_nan_filter (git-fixes).\n- ntb: intel: fix port config status offset for SPR (git-fixes).\n- nvme-multipath: use vmalloc for ANA log buffer (bsc#1193787).\n- nvme-rdma: fix possible use-after-free in transport error_recovery work (git-fixes).\n- nvme-tcp: fix possible use-after-free in transport error_recovery work (git-fixes).\n- nvme: fix a possible use-after-free in controller reset during load (git-fixes).\n- powerpc/dma: Fallback to dma_ops when persistent memory present (bsc#1196472 ltc#192278). Update config files.\n- powerpc/fadump: register for fadump as early as possible (bsc#1179439 ltc#190038).\n- powerpc/mm: Remove dcache flush from memory remove (bsc#1196433 ltc#196449).\n- powerpc/powernv/memtrace: Fix dcache flushing (bsc#1196433 ltc#196449).\n- powerpc/pseries/iommu: Fix window size for direct mapping with pmem (bsc#1196472 ltc#192278).\n- rpm/*.spec.in: Use https:// urls\n- rpm/arch-symbols,guards,*driver: Replace Novell with SUSE.\n- rpm/check-for-config-changes: Ignore PAHOLE_VERSION.\n- rpm/kernel-docs.spec.in: use %%license for license declarations Limited to SLE15+ to avoid compatibility nightmares.\n- rpm/kernel-source.spec.in: call fdupes per subpackage It is a waste of time to do a global fdupes when we have subpackages.\n- rpm: SC2006: Use $(...) notation instead of legacy backticked `...`.\n- sched/core: Mitigate race (git-fixes)\n- scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() (git-fixes).\n- scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe (git-fixes).\n- scsi: lpfc: Terminate string in lpfc_debugfs_nvmeio_trc_write() (git-fixes).\n- scsi: nsp_cs: Check of ioremap return value (git-fixes).\n- scsi: qedf: Fix potential dereference of NULL pointer (git-fixes).\n- scsi: smartpqi: Add PCI IDs (bsc#1196627).\n- scsi: ufs: Fix race conditions related to driver data (git-fixes).\n- selftests: mlxsw: tc_police_scale: Make test more robust (bsc#1176774).\n- soc: fsl: Correct MAINTAINERS database (QUICC ENGINE LIBRARY) (git-fixes).\n- soc: fsl: Correct MAINTAINERS database (SOC) (git-fixes).\n- soc: fsl: qe: Check of ioremap return value (git-fixes).\n- spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op() (git-fixes).\n- sr9700: sanity check for packet length (bsc#1196836).\n- staging: gdm724x: fix use after free in gdm_lte_rx() (git-fixes).\n- tracing: Fix return value of __setup handlers (git-fixes).\n- tty: n_gsm: fix encoding of control signal octet bit DV (git-fixes).\n- tty: n_gsm: fix proper link termination after failed open (git-fixes).\n- usb: dwc2: Fix Stalling a Non-Isochronous OUT EP (git-fixes).\n- usb: dwc2: gadget: Fix GOUTNAK flow for Slave mode (git-fixes).\n- usb: dwc2: gadget: Fix kill_all_requests race (git-fixes).\n- usb: dwc2: use well defined macros for power_down (git-fixes).\n- usb: dwc3: gadget: Let the interrupt handler disable bottom halves (git-fixes).\n- usb: dwc3: meson-g12a: Disable the regulator in the error handling path of the probe (git-fixes).\n- usb: dwc3: pci: Fix Bay Trail phy GPIO mappings (git-fixes).\n- usb: gadget: rndis: add spinlock for rndis response list (git-fixes).\n- usb: host: xen-hcd: add missing unlock in error path (git-fixes).\n- usb: hub: Fix locking issues with address0_mutex (git-fixes).\n- usb: hub: Fix usb enumeration issue due to address0 race (git-fixes).\n- vrf: Fix fast path output packet handling with async Netfilter rules (git-fixes).\n- xen/usb: do not use gnttab_end_foreign_access() in xenhcd_gnttab_done() (bsc#1196488, XSA-396).\n- xhci: Prevent futile URB re-submissions due to incorrect return value (git-fixes).\n- xhci: re-initialize the HC during resume if HCE was set (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "openSUSE-SLE-15.3-2022-1039,openSUSE-SLE-15.4-2022-1039", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_1039-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2022:1039-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2022:1039-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/", }, { category: "self", summary: "SUSE Bug 1176447", url: "https://bugzilla.suse.com/1176447", }, { category: "self", summary: "SUSE Bug 1176774", url: "https://bugzilla.suse.com/1176774", }, { category: "self", summary: "SUSE Bug 1178134", url: "https://bugzilla.suse.com/1178134", }, { category: "self", summary: "SUSE Bug 1179439", url: "https://bugzilla.suse.com/1179439", }, { category: "self", summary: "SUSE Bug 1181147", url: "https://bugzilla.suse.com/1181147", }, { category: "self", summary: "SUSE Bug 1191428", url: "https://bugzilla.suse.com/1191428", }, { category: "self", summary: "SUSE Bug 1192273", url: "https://bugzilla.suse.com/1192273", }, { category: "self", summary: "SUSE Bug 1193731", url: "https://bugzilla.suse.com/1193731", }, { category: "self", summary: "SUSE Bug 1193787", url: "https://bugzilla.suse.com/1193787", }, { category: "self", summary: "SUSE Bug 1193864", url: "https://bugzilla.suse.com/1193864", }, { category: "self", summary: "SUSE Bug 1194463", url: "https://bugzilla.suse.com/1194463", }, { category: "self", summary: "SUSE Bug 1194516", url: "https://bugzilla.suse.com/1194516", }, { category: "self", summary: "SUSE Bug 1194943", url: "https://bugzilla.suse.com/1194943", }, { category: "self", summary: "SUSE Bug 1195051", url: "https://bugzilla.suse.com/1195051", }, { category: "self", summary: "SUSE Bug 1195211", url: "https://bugzilla.suse.com/1195211", }, { category: "self", summary: "SUSE Bug 1195254", url: "https://bugzilla.suse.com/1195254", }, { category: "self", summary: "SUSE Bug 1195353", url: "https://bugzilla.suse.com/1195353", }, { category: "self", summary: "SUSE Bug 1195403", url: "https://bugzilla.suse.com/1195403", }, { category: "self", summary: "SUSE Bug 1195612", url: "https://bugzilla.suse.com/1195612", }, { category: "self", summary: "SUSE Bug 1195897", url: "https://bugzilla.suse.com/1195897", }, { category: "self", summary: "SUSE Bug 1195905", url: "https://bugzilla.suse.com/1195905", }, { category: "self", summary: "SUSE Bug 1195939", url: "https://bugzilla.suse.com/1195939", }, { category: "self", summary: "SUSE Bug 1195949", url: "https://bugzilla.suse.com/1195949", }, { category: "self", summary: "SUSE Bug 1195987", url: "https://bugzilla.suse.com/1195987", }, { category: "self", summary: "SUSE Bug 1196079", url: "https://bugzilla.suse.com/1196079", }, { category: "self", summary: "SUSE Bug 1196095", url: "https://bugzilla.suse.com/1196095", }, { category: "self", summary: "SUSE Bug 1196130", url: "https://bugzilla.suse.com/1196130", }, { category: "self", summary: "SUSE Bug 1196132", url: "https://bugzilla.suse.com/1196132", }, { category: "self", summary: "SUSE Bug 1196155", url: "https://bugzilla.suse.com/1196155", }, { category: "self", summary: "SUSE Bug 1196299", url: "https://bugzilla.suse.com/1196299", }, { category: "self", summary: "SUSE Bug 1196301", url: "https://bugzilla.suse.com/1196301", }, { category: "self", summary: "SUSE Bug 1196433", url: "https://bugzilla.suse.com/1196433", }, { category: "self", summary: "SUSE Bug 1196468", url: "https://bugzilla.suse.com/1196468", }, { category: "self", summary: "SUSE Bug 1196472", url: "https://bugzilla.suse.com/1196472", }, { category: "self", summary: "SUSE Bug 1196488", url: "https://bugzilla.suse.com/1196488", }, { category: "self", summary: "SUSE Bug 1196627", url: "https://bugzilla.suse.com/1196627", }, { category: "self", summary: "SUSE Bug 1196723", url: "https://bugzilla.suse.com/1196723", }, { category: "self", summary: "SUSE Bug 1196779", url: "https://bugzilla.suse.com/1196779", }, { category: "self", summary: "SUSE Bug 1196830", url: "https://bugzilla.suse.com/1196830", }, { category: "self", summary: "SUSE Bug 1196836", url: "https://bugzilla.suse.com/1196836", }, { category: "self", summary: "SUSE Bug 1196866", url: "https://bugzilla.suse.com/1196866", }, { category: "self", summary: "SUSE Bug 1196868", url: "https://bugzilla.suse.com/1196868", }, { category: "self", summary: "SUSE Bug 1196956", url: "https://bugzilla.suse.com/1196956", }, { category: "self", summary: "SUSE Bug 1196959", url: "https://bugzilla.suse.com/1196959", }, { category: "self", summary: "SUSE CVE CVE-2021-0920 page", url: "https://www.suse.com/security/cve/CVE-2021-0920/", }, { category: "self", summary: "SUSE CVE CVE-2021-39657 page", url: "https://www.suse.com/security/cve/CVE-2021-39657/", }, { category: "self", summary: "SUSE CVE CVE-2021-39698 page", url: "https://www.suse.com/security/cve/CVE-2021-39698/", }, { category: "self", summary: "SUSE CVE CVE-2021-44879 page", url: "https://www.suse.com/security/cve/CVE-2021-44879/", }, { category: "self", summary: "SUSE CVE CVE-2021-45402 page", url: "https://www.suse.com/security/cve/CVE-2021-45402/", }, { category: "self", summary: "SUSE CVE CVE-2022-0487 page", url: "https://www.suse.com/security/cve/CVE-2022-0487/", }, { category: "self", summary: "SUSE CVE CVE-2022-0617 page", url: "https://www.suse.com/security/cve/CVE-2022-0617/", }, { category: "self", summary: "SUSE CVE CVE-2022-0644 page", url: "https://www.suse.com/security/cve/CVE-2022-0644/", }, { category: "self", summary: "SUSE CVE CVE-2022-23036 page", url: "https://www.suse.com/security/cve/CVE-2022-23036/", }, { category: "self", summary: "SUSE CVE CVE-2022-23037 page", url: "https://www.suse.com/security/cve/CVE-2022-23037/", }, { category: "self", summary: "SUSE CVE CVE-2022-23038 page", url: "https://www.suse.com/security/cve/CVE-2022-23038/", }, { category: "self", summary: "SUSE CVE CVE-2022-23039 page", url: "https://www.suse.com/security/cve/CVE-2022-23039/", }, { category: "self", summary: "SUSE CVE CVE-2022-23040 page", url: "https://www.suse.com/security/cve/CVE-2022-23040/", }, { category: "self", summary: "SUSE CVE CVE-2022-23041 page", url: "https://www.suse.com/security/cve/CVE-2022-23041/", }, { category: "self", summary: "SUSE CVE CVE-2022-23042 page", url: "https://www.suse.com/security/cve/CVE-2022-23042/", }, { category: "self", summary: "SUSE CVE CVE-2022-24448 page", url: "https://www.suse.com/security/cve/CVE-2022-24448/", }, { category: "self", summary: "SUSE CVE CVE-2022-24958 page", url: "https://www.suse.com/security/cve/CVE-2022-24958/", }, { category: "self", summary: "SUSE CVE CVE-2022-24959 page", url: "https://www.suse.com/security/cve/CVE-2022-24959/", }, { category: "self", summary: "SUSE CVE CVE-2022-25258 page", url: "https://www.suse.com/security/cve/CVE-2022-25258/", }, { category: "self", summary: "SUSE CVE CVE-2022-25636 page", url: "https://www.suse.com/security/cve/CVE-2022-25636/", }, { category: "self", summary: "SUSE CVE CVE-2022-26490 page", url: "https://www.suse.com/security/cve/CVE-2022-26490/", }, { category: "self", summary: "SUSE CVE CVE-2022-26966 page", url: "https://www.suse.com/security/cve/CVE-2022-26966/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2022-03-30T07:38:27Z", generator: { date: "2022-03-30T07:38:27Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2022:1039-1", initial_release_date: "2022-03-30T07:38:27Z", revision_history: [ { date: "2022-03-30T07:38:27Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", product: { name: "cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", product_id: "cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", product: { name: "cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", product_id: "cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", product: { name: "cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", product_id: "cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", product: { name: "dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", product_id: "dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", product: { name: "dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", product_id: "dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", product: { name: "dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", product_id: "dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-al-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-al-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-al-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-allwinner-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-allwinner-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-allwinner-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-altera-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-altera-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-altera-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-amd-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-amd-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-amd-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-amlogic-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-amlogic-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-amlogic-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-apm-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-apm-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-apm-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-arm-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-arm-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-arm-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-broadcom-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-broadcom-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-broadcom-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-cavium-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-cavium-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-cavium-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-exynos-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-exynos-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-exynos-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-freescale-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-freescale-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-freescale-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-lg-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-lg-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-lg-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-marvell-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-marvell-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-marvell-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-mediatek-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-mediatek-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-mediatek-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-nvidia-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-nvidia-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-nvidia-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-qcom-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-qcom-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-qcom-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-renesas-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-renesas-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-renesas-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-rockchip-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-rockchip-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-rockchip-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-socionext-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-socionext-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-socionext-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-sprd-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-sprd-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-sprd-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-xilinx-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-xilinx-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-xilinx-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "dtb-zte-5.3.18-150300.59.60.4.aarch64", product: { name: "dtb-zte-5.3.18-150300.59.60.4.aarch64", product_id: "dtb-zte-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", product: { name: "gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", product_id: "gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", product: { name: "gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", product_id: "gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", product: { name: "gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", product_id: "gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-64kb-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-64kb-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-64kb-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-default-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-default-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-default-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", product: { name: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", product_id: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", product: { name: "kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", product_id: "kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-default-devel-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-default-devel-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-default-extra-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-default-extra-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-default-optional-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-default-optional-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-default-optional-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-obs-build-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-obs-build-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-preempt-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-preempt-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-preempt-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150300.59.60.4.aarch64", product: { name: "kernel-syms-5.3.18-150300.59.60.4.aarch64", product_id: "kernel-syms-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", product: { name: "kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", product_id: "kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", product: { name: "kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", product_id: "kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", product: { name: "kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", product_id: "kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", product: { name: "ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", product_id: "ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", product: { name: "ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", product_id: "ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", product: { name: "ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", product_id: "ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", product: { name: "reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", product_id: "reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", product: { name: "reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", product_id: "reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", product: { name: "reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", product_id: "reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-5.3.18-150300.59.60.4.noarch", product: { name: "kernel-devel-5.3.18-150300.59.60.4.noarch", product_id: "kernel-devel-5.3.18-150300.59.60.4.noarch", }, }, { category: "product_version", name: "kernel-docs-5.3.18-150300.59.60.4.noarch", product: { name: "kernel-docs-5.3.18-150300.59.60.4.noarch", product_id: "kernel-docs-5.3.18-150300.59.60.4.noarch", }, }, { category: "product_version", name: "kernel-docs-html-5.3.18-150300.59.60.4.noarch", product: { name: "kernel-docs-html-5.3.18-150300.59.60.4.noarch", product_id: "kernel-docs-html-5.3.18-150300.59.60.4.noarch", }, }, { category: "product_version", name: "kernel-macros-5.3.18-150300.59.60.4.noarch", product: { name: "kernel-macros-5.3.18-150300.59.60.4.noarch", product_id: "kernel-macros-5.3.18-150300.59.60.4.noarch", }, }, { category: "product_version", name: "kernel-source-5.3.18-150300.59.60.4.noarch", product: { name: "kernel-source-5.3.18-150300.59.60.4.noarch", product_id: "kernel-source-5.3.18-150300.59.60.4.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", product: { name: "kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", product_id: "kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", product: { name: "cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", product_id: "cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", product: { name: "dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", product_id: "dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", product: { name: "gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", product_id: "gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "kernel-debug-5.3.18-150300.59.60.4.ppc64le", product: { name: "kernel-debug-5.3.18-150300.59.60.4.ppc64le", product_id: "kernel-debug-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", product: { name: "kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", product_id: "kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", product: { name: "kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", product_id: "kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "kernel-default-5.3.18-150300.59.60.4.ppc64le", product: { name: "kernel-default-5.3.18-150300.59.60.4.ppc64le", product_id: "kernel-default-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", product: { name: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", product_id: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", product: { name: "kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", product_id: "kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", product: { name: "kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", product_id: "kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", product: { name: "kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", product_id: "kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", product: { name: "kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", product_id: "kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", product: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", product_id: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", product: { name: "kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", product_id: "kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", product: { name: "kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", product_id: "kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", product: { name: "kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", product_id: "kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", product: { name: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", product_id: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", product: { name: "kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", product_id: "kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", product: { name: "kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", product_id: "kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150300.59.60.4.ppc64le", product: { name: "kernel-syms-5.3.18-150300.59.60.4.ppc64le", product_id: "kernel-syms-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", product: { name: "kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", product_id: "kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", product: { name: "ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", product_id: "ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", product: { name: "reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", product_id: "reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", product: { name: "cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", product_id: "cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150300.59.60.4.s390x", product: { name: "dlm-kmp-default-5.3.18-150300.59.60.4.s390x", product_id: "dlm-kmp-default-5.3.18-150300.59.60.4.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", product: { name: "gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", product_id: "gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", }, }, { category: "product_version", name: "kernel-default-5.3.18-150300.59.60.4.s390x", product: { name: "kernel-default-5.3.18-150300.59.60.4.s390x", product_id: "kernel-default-5.3.18-150300.59.60.4.s390x", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", product: { name: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", product_id: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", product: { name: "kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", product_id: "kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150300.59.60.4.s390x", product: { name: "kernel-default-devel-5.3.18-150300.59.60.4.s390x", product_id: "kernel-default-devel-5.3.18-150300.59.60.4.s390x", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150300.59.60.4.s390x", product: { name: "kernel-default-extra-5.3.18-150300.59.60.4.s390x", product_id: "kernel-default-extra-5.3.18-150300.59.60.4.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", product: { name: "kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", product_id: "kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", product: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", product_id: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", }, }, { category: "product_version", name: "kernel-default-optional-5.3.18-150300.59.60.4.s390x", product: { name: "kernel-default-optional-5.3.18-150300.59.60.4.s390x", product_id: "kernel-default-optional-5.3.18-150300.59.60.4.s390x", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150300.59.60.4.s390x", product: { name: "kernel-obs-build-5.3.18-150300.59.60.4.s390x", product_id: "kernel-obs-build-5.3.18-150300.59.60.4.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150300.59.60.4.s390x", product: { name: "kernel-obs-qa-5.3.18-150300.59.60.4.s390x", product_id: "kernel-obs-qa-5.3.18-150300.59.60.4.s390x", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150300.59.60.4.s390x", product: { name: "kernel-syms-5.3.18-150300.59.60.4.s390x", product_id: "kernel-syms-5.3.18-150300.59.60.4.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", product: { name: "kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", product_id: "kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", product: { name: "kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", product_id: "kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", product: { name: "ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", product_id: "ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", product: { name: "reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", product_id: "reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", product: { name: "cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", product_id: "cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", product: { name: "cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", product_id: "cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", product: { name: "dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", product_id: "dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", product: { name: "dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", product_id: "dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", product: { name: "gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", product_id: "gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", product: { name: "gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", product_id: "gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-debug-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-debug-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-debug-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-default-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-default-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-default-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", product: { name: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", product_id: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", product: { name: "kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", product_id: "kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-default-devel-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-default-devel-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-default-extra-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-default-extra-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-default-optional-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-default-optional-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-default-optional-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-obs-build-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-obs-build-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-preempt-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-preempt-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-preempt-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150300.59.60.4.x86_64", product: { name: "kernel-syms-5.3.18-150300.59.60.4.x86_64", product_id: "kernel-syms-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", product: { name: "kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", product_id: "kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", product: { name: "kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", product_id: "kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", product: { name: "ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", product_id: "ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", product: { name: "ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", product_id: "ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", product: { name: "reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", product_id: "reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", product: { name: "reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", product_id: "reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.3", product: { name: "openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", }, product_reference: "cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", }, product_reference: "cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", }, product_reference: "cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", }, product_reference: "cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", }, product_reference: "cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", }, product_reference: "cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", }, product_reference: "cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", }, product_reference: "dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", }, product_reference: "dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", }, product_reference: "dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150300.59.60.4.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", }, product_reference: "dlm-kmp-default-5.3.18-150300.59.60.4.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150300.59.60.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", }, product_reference: "dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", }, product_reference: "dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", }, product_reference: "dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-al-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", }, product_reference: "dtb-al-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-allwinner-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", }, product_reference: "dtb-allwinner-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-altera-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", }, product_reference: "dtb-altera-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-amd-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", }, product_reference: "dtb-amd-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-amlogic-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", }, product_reference: "dtb-amlogic-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-apm-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", }, product_reference: "dtb-apm-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-arm-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", }, product_reference: "dtb-arm-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-broadcom-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", }, product_reference: "dtb-broadcom-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-cavium-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", }, product_reference: "dtb-cavium-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-exynos-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", }, product_reference: "dtb-exynos-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-freescale-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", }, product_reference: "dtb-freescale-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-hisilicon-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", }, product_reference: "dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-lg-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", }, product_reference: "dtb-lg-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-marvell-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", }, product_reference: "dtb-marvell-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-mediatek-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", }, product_reference: "dtb-mediatek-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-nvidia-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", }, product_reference: "dtb-nvidia-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-qcom-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", }, product_reference: "dtb-qcom-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-renesas-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", }, product_reference: "dtb-renesas-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-rockchip-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", }, product_reference: "dtb-rockchip-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-socionext-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", }, product_reference: "dtb-socionext-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-sprd-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", }, product_reference: "dtb-sprd-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-xilinx-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", }, product_reference: "dtb-xilinx-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-zte-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", }, product_reference: "dtb-zte-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", }, product_reference: "gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", }, product_reference: "gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", }, product_reference: "gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150300.59.60.4.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", }, product_reference: "gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", }, product_reference: "gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", }, product_reference: "gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", }, product_reference: "gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", }, product_reference: "kernel-64kb-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", }, product_reference: "kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", }, product_reference: "kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", }, product_reference: "kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", }, product_reference: "kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-5.3.18-150300.59.60.4.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", }, product_reference: "kernel-debug-5.3.18-150300.59.60.4.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-5.3.18-150300.59.60.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", }, product_reference: "kernel-debug-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", }, product_reference: "kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-5.3.18-150300.59.60.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", }, product_reference: "kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", }, product_reference: "kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", }, product_reference: "kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", }, product_reference: "kernel-default-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.60.4.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", }, product_reference: "kernel-default-5.3.18-150300.59.60.4.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.60.4.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", }, product_reference: "kernel-default-5.3.18-150300.59.60.4.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.60.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", }, product_reference: "kernel-default-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", }, product_reference: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", }, product_reference: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", }, product_reference: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", }, product_reference: "kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", }, product_reference: "kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", }, product_reference: "kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", }, product_reference: "kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", }, product_reference: "kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", }, product_reference: "kernel-default-devel-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.60.4.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", }, product_reference: "kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.60.4.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", }, product_reference: "kernel-default-devel-5.3.18-150300.59.60.4.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.60.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", }, product_reference: "kernel-default-devel-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", }, product_reference: "kernel-default-extra-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.3.18-150300.59.60.4.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", }, product_reference: "kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.3.18-150300.59.60.4.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", }, product_reference: "kernel-default-extra-5.3.18-150300.59.60.4.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.3.18-150300.59.60.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", }, product_reference: "kernel-default-extra-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", }, product_reference: "kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", }, product_reference: "kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150300.59.60.4.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", }, product_reference: "kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", }, product_reference: "kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", }, product_reference: "kernel-default-optional-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.3.18-150300.59.60.4.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", }, product_reference: "kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.3.18-150300.59.60.4.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", }, product_reference: "kernel-default-optional-5.3.18-150300.59.60.4.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.3.18-150300.59.60.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", }, product_reference: "kernel-default-optional-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-150300.59.60.4.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", }, product_reference: "kernel-devel-5.3.18-150300.59.60.4.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-150300.59.60.4.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", }, product_reference: "kernel-docs-5.3.18-150300.59.60.4.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-html-5.3.18-150300.59.60.4.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", }, product_reference: "kernel-docs-html-5.3.18-150300.59.60.4.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", }, product_reference: "kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", }, product_reference: "kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", }, product_reference: "kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", }, product_reference: "kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", }, product_reference: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", }, product_reference: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-150300.59.60.4.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", }, product_reference: "kernel-macros-5.3.18-150300.59.60.4.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", }, product_reference: "kernel-obs-build-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.60.4.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", }, product_reference: "kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.60.4.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", }, product_reference: "kernel-obs-build-5.3.18-150300.59.60.4.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.60.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", }, product_reference: "kernel-obs-build-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", }, product_reference: "kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", }, product_reference: "kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.3.18-150300.59.60.4.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", }, product_reference: "kernel-obs-qa-5.3.18-150300.59.60.4.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.3.18-150300.59.60.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", }, product_reference: "kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", }, product_reference: "kernel-preempt-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150300.59.60.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", }, product_reference: "kernel-preempt-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", }, product_reference: "kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", }, product_reference: "kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", }, product_reference: "kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", }, product_reference: "kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", }, product_reference: "kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", }, product_reference: "kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", }, product_reference: "kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-150300.59.60.4.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", }, product_reference: "kernel-source-5.3.18-150300.59.60.4.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-vanilla-5.3.18-150300.59.60.4.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", }, product_reference: "kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", }, product_reference: "kernel-syms-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.60.4.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", }, product_reference: "kernel-syms-5.3.18-150300.59.60.4.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.60.4.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", }, product_reference: "kernel-syms-5.3.18-150300.59.60.4.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.60.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", }, product_reference: "kernel-syms-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-5.3.18-150300.59.60.4.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", }, product_reference: "kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", }, product_reference: "kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", }, product_reference: "kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", }, product_reference: "kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.3.18-150300.59.60.4.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", }, product_reference: "kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", }, product_reference: "kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", }, product_reference: "kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", }, product_reference: "kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", }, product_reference: "ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", }, product_reference: "ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", }, product_reference: "ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", }, product_reference: "ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", }, product_reference: "ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", }, product_reference: "ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", }, product_reference: "ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", }, product_reference: "reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", }, product_reference: "reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", }, product_reference: "reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, ], }, vulnerabilities: [ { cve: "CVE-2021-0920", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-0920", }, ], notes: [ { category: "general", text: "In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-0920", url: "https://www.suse.com/security/cve/CVE-2021-0920", }, { category: "external", summary: "SUSE Bug 1193731 for CVE-2021-0920", url: "https://bugzilla.suse.com/1193731", }, { category: "external", summary: "SUSE Bug 1194463 for CVE-2021-0920", url: "https://bugzilla.suse.com/1194463", }, { category: "external", summary: "SUSE Bug 1195939 for CVE-2021-0920", url: "https://bugzilla.suse.com/1195939", }, { category: "external", summary: "SUSE Bug 1199255 for CVE-2021-0920", url: "https://bugzilla.suse.com/1199255", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2021-0920", url: "https://bugzilla.suse.com/1200084", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:27Z", details: "important", }, ], title: "CVE-2021-0920", }, { cve: "CVE-2021-39657", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39657", }, ], notes: [ { category: "general", text: "In ufshcd_eh_device_reset_handler of ufshcd.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-194696049References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39657", url: "https://www.suse.com/security/cve/CVE-2021-39657", }, { category: "external", summary: "SUSE Bug 1193864 for CVE-2021-39657", url: "https://bugzilla.suse.com/1193864", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:27Z", details: "low", }, ], title: "CVE-2021-39657", }, { cve: "CVE-2021-39698", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39698", }, ], notes: [ { category: "general", text: "In aio_poll_complete_work of aio.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-185125206References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39698", url: "https://www.suse.com/security/cve/CVE-2021-39698", }, { category: "external", summary: "SUSE Bug 1196956 for CVE-2021-39698", url: "https://bugzilla.suse.com/1196956", }, { category: "external", summary: "SUSE Bug 1196959 for CVE-2021-39698", url: "https://bugzilla.suse.com/1196959", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2021-39698", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:27Z", details: "important", }, ], title: "CVE-2021-39698", }, { cve: "CVE-2021-44879", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-44879", }, ], notes: [ { category: "general", text: "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-44879", url: "https://www.suse.com/security/cve/CVE-2021-44879", }, { category: "external", summary: "SUSE Bug 1195987 for CVE-2021-44879", url: "https://bugzilla.suse.com/1195987", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:27Z", details: "moderate", }, ], title: "CVE-2021-44879", }, { cve: "CVE-2021-45402", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-45402", }, ], notes: [ { category: "general", text: "The check_alu_op() function in kernel/bpf/verifier.c in the Linux kernel through v5.16-rc5 did not properly update bounds while handling the mov32 instruction, which allows local users to obtain potentially sensitive address information, aka a \"pointer leak.\"", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-45402", url: "https://www.suse.com/security/cve/CVE-2021-45402", }, { category: "external", summary: "SUSE Bug 1196130 for CVE-2021-45402", url: "https://bugzilla.suse.com/1196130", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:27Z", details: "moderate", }, ], title: "CVE-2021-45402", }, { cve: "CVE-2022-0487", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0487", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0487", url: "https://www.suse.com/security/cve/CVE-2022-0487", }, { category: "external", summary: "SUSE Bug 1194516 for CVE-2022-0487", url: "https://bugzilla.suse.com/1194516", }, { category: "external", summary: "SUSE Bug 1195949 for CVE-2022-0487", url: "https://bugzilla.suse.com/1195949", }, { category: "external", summary: "SUSE Bug 1198615 for CVE-2022-0487", url: "https://bugzilla.suse.com/1198615", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:27Z", details: "moderate", }, ], title: "CVE-2022-0487", }, { cve: "CVE-2022-0617", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0617", }, ], notes: [ { category: "general", text: "A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0617", url: "https://www.suse.com/security/cve/CVE-2022-0617", }, { category: "external", summary: "SUSE Bug 1196079 for CVE-2022-0617", url: "https://bugzilla.suse.com/1196079", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:27Z", details: "moderate", }, ], title: "CVE-2022-0617", }, { cve: "CVE-2022-0644", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0644", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0644", url: "https://www.suse.com/security/cve/CVE-2022-0644", }, { category: "external", summary: "SUSE Bug 1196155 for CVE-2022-0644", url: "https://bugzilla.suse.com/1196155", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:27Z", details: "moderate", }, ], title: "CVE-2022-0644", }, { cve: "CVE-2022-23036", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-23036", }, ], notes: [ { category: "general", text: "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-23036", url: "https://www.suse.com/security/cve/CVE-2022-23036", }, { category: "external", summary: "SUSE Bug 1196488 for CVE-2022-23036", url: "https://bugzilla.suse.com/1196488", }, { category: "external", summary: "SUSE Bug 1199099 for CVE-2022-23036", url: "https://bugzilla.suse.com/1199099", }, { category: "external", summary: "SUSE Bug 1199141 for CVE-2022-23036", url: "https://bugzilla.suse.com/1199141", }, { category: "external", summary: "SUSE Bug 1204132 for CVE-2022-23036", url: "https://bugzilla.suse.com/1204132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:27Z", details: "important", }, ], title: "CVE-2022-23036", }, { cve: "CVE-2022-23037", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-23037", }, ], notes: [ { category: "general", text: "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-23037", url: "https://www.suse.com/security/cve/CVE-2022-23037", }, { category: "external", summary: "SUSE Bug 1199099 for CVE-2022-23037", url: "https://bugzilla.suse.com/1199099", }, { category: "external", summary: "SUSE Bug 1199141 for CVE-2022-23037", url: "https://bugzilla.suse.com/1199141", }, { category: "external", summary: "SUSE Bug 1204132 for CVE-2022-23037", url: "https://bugzilla.suse.com/1204132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:27Z", details: "important", }, ], title: "CVE-2022-23037", }, { cve: "CVE-2022-23038", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-23038", }, ], notes: [ { category: "general", text: "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-23038", url: "https://www.suse.com/security/cve/CVE-2022-23038", }, { category: "external", summary: "SUSE Bug 1199099 for CVE-2022-23038", url: "https://bugzilla.suse.com/1199099", }, { category: "external", summary: "SUSE Bug 1199141 for CVE-2022-23038", url: "https://bugzilla.suse.com/1199141", }, { category: "external", summary: "SUSE Bug 1204132 for CVE-2022-23038", url: "https://bugzilla.suse.com/1204132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:27Z", details: "important", }, ], title: "CVE-2022-23038", }, { cve: "CVE-2022-23039", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-23039", }, ], notes: [ { category: "general", text: "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-23039", url: "https://www.suse.com/security/cve/CVE-2022-23039", }, { category: "external", summary: "SUSE Bug 1199099 for CVE-2022-23039", url: "https://bugzilla.suse.com/1199099", }, { category: "external", summary: "SUSE Bug 1199141 for CVE-2022-23039", url: "https://bugzilla.suse.com/1199141", }, { category: "external", summary: "SUSE Bug 1204132 for CVE-2022-23039", url: "https://bugzilla.suse.com/1204132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:27Z", details: "important", }, ], title: "CVE-2022-23039", }, { cve: "CVE-2022-23040", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-23040", }, ], notes: [ { category: "general", text: "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-23040", url: "https://www.suse.com/security/cve/CVE-2022-23040", }, { category: "external", summary: "SUSE Bug 1199099 for CVE-2022-23040", url: "https://bugzilla.suse.com/1199099", }, { category: "external", summary: "SUSE Bug 1199141 for CVE-2022-23040", url: "https://bugzilla.suse.com/1199141", }, { category: "external", summary: "SUSE Bug 1204132 for CVE-2022-23040", url: "https://bugzilla.suse.com/1204132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:27Z", details: "important", }, ], title: "CVE-2022-23040", }, { cve: "CVE-2022-23041", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-23041", }, ], notes: [ { category: "general", text: "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-23041", url: "https://www.suse.com/security/cve/CVE-2022-23041", }, { category: "external", summary: "SUSE Bug 1199099 for CVE-2022-23041", url: "https://bugzilla.suse.com/1199099", }, { category: "external", summary: "SUSE Bug 1199141 for CVE-2022-23041", url: "https://bugzilla.suse.com/1199141", }, { category: "external", summary: "SUSE Bug 1204132 for CVE-2022-23041", url: "https://bugzilla.suse.com/1204132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:27Z", details: "important", }, ], title: "CVE-2022-23041", }, { cve: "CVE-2022-23042", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-23042", }, ], notes: [ { category: "general", text: "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-23042", url: "https://www.suse.com/security/cve/CVE-2022-23042", }, { category: "external", summary: "SUSE Bug 1199099 for CVE-2022-23042", url: "https://bugzilla.suse.com/1199099", }, { category: "external", summary: "SUSE Bug 1199141 for CVE-2022-23042", url: "https://bugzilla.suse.com/1199141", }, { category: "external", summary: "SUSE Bug 1204132 for CVE-2022-23042", url: "https://bugzilla.suse.com/1204132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:27Z", details: "important", }, ], title: "CVE-2022-23042", }, { cve: "CVE-2022-24448", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-24448", }, ], notes: [ { category: "general", text: "An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-24448", url: "https://www.suse.com/security/cve/CVE-2022-24448", }, { category: "external", summary: "SUSE Bug 1195612 for CVE-2022-24448", url: "https://bugzilla.suse.com/1195612", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:27Z", details: "moderate", }, ], title: "CVE-2022-24448", }, { cve: "CVE-2022-24958", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-24958", }, ], notes: [ { category: "general", text: "drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev->buf release.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-24958", url: "https://www.suse.com/security/cve/CVE-2022-24958", }, { category: "external", summary: "SUSE Bug 1195905 for CVE-2022-24958", url: "https://bugzilla.suse.com/1195905", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:27Z", details: "moderate", }, ], title: "CVE-2022-24958", }, { cve: "CVE-2022-24959", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-24959", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-24959", url: "https://www.suse.com/security/cve/CVE-2022-24959", }, { category: "external", summary: "SUSE Bug 1195897 for CVE-2022-24959", url: "https://bugzilla.suse.com/1195897", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:27Z", details: "moderate", }, ], title: "CVE-2022-24959", }, { cve: "CVE-2022-25258", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-25258", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-25258", url: "https://www.suse.com/security/cve/CVE-2022-25258", }, { category: "external", summary: "SUSE Bug 1196095 for CVE-2022-25258", url: "https://bugzilla.suse.com/1196095", }, { category: "external", summary: "SUSE Bug 1196132 for CVE-2022-25258", url: "https://bugzilla.suse.com/1196132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:27Z", details: "important", }, ], title: "CVE-2022-25258", }, { cve: "CVE-2022-25636", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-25636", }, ], notes: [ { category: "general", text: "net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows local users to gain privileges because of a heap out-of-bounds write. This is related to nf_tables_offload.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-25636", url: "https://www.suse.com/security/cve/CVE-2022-25636", }, { category: "external", summary: "SUSE Bug 1196299 for CVE-2022-25636", url: "https://bugzilla.suse.com/1196299", }, { category: "external", summary: "SUSE Bug 1196301 for CVE-2022-25636", url: "https://bugzilla.suse.com/1196301", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:27Z", details: "important", }, ], title: "CVE-2022-25636", }, { cve: "CVE-2022-26490", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-26490", }, ], notes: [ { category: "general", text: "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-26490", url: "https://www.suse.com/security/cve/CVE-2022-26490", }, { category: "external", summary: "SUSE Bug 1196830 for CVE-2022-26490", url: "https://bugzilla.suse.com/1196830", }, { category: "external", summary: "SUSE Bug 1201656 for CVE-2022-26490", url: "https://bugzilla.suse.com/1201656", }, { category: "external", summary: "SUSE Bug 1201969 for CVE-2022-26490", url: "https://bugzilla.suse.com/1201969", }, { category: "external", summary: "SUSE Bug 1211495 for CVE-2022-26490", url: "https://bugzilla.suse.com/1211495", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:27Z", details: "important", }, ], title: "CVE-2022-26490", }, { cve: "CVE-2022-26966", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-26966", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.16.12. drivers/net/usb/sr9700.c allows attackers to obtain sensitive information from heap memory via crafted frame lengths from a device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-26966", url: "https://www.suse.com/security/cve/CVE-2022-26966", }, { category: "external", summary: "SUSE Bug 1196836 for CVE-2022-26966", url: "https://bugzilla.suse.com/1196836", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.60.4.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.60.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.60.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-30T07:38:27Z", details: "moderate", }, ], title: "CVE-2022-26966", }, ], }
fkie_cve-2022-25258
Vulnerability from fkie_nvd
Published
2022-02-16 20:15
Modified
2024-11-21 06:51
Severity ?
Summary
An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
fedoraproject | fedora | 35 | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
debian | debian_linux | 11.0 | |
netapp | active_iq_unified_manager | - | |
netapp | h300s_firmware | - | |
netapp | h300s | - | |
netapp | h500s_firmware | - | |
netapp | h500s | - | |
netapp | h700s_firmware | - | |
netapp | h700s | - | |
netapp | h410s_firmware | - | |
netapp | h410s | - | |
netapp | h410c_firmware | - | |
netapp | h410c | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "6FADC79F-20B6-4353-B8FF-03CDC52EFBE4", versionEndExcluding: "5.16.10", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", matchCriteriaId: "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", matchCriteriaId: "FA6FEEC2-9F11-4643-8827-749718254FED", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", matchCriteriaId: "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6770B6C3-732E-4E22-BF1C-2D2FD610061C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", matchCriteriaId: "9F9C8C20-42EB-4AB5-BD97-212DEB070C43", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7FFF7106-ED78-49BA-9EC5-B889E3685D53", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", matchCriteriaId: "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "56409CEC-5A1E-4450-AA42-641E459CC2AF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", matchCriteriaId: "B06F4839-D16A-4A61-9BB5-55B13F41E47F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D0B4AD8A-F172-4558-AEC6-FF424BA2D912", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", matchCriteriaId: "8497A4C9-8474-4A62-8331-3FE862ED4098", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", matchCriteriaId: "CDDF61B7-EC5C-467C-B710-B89F502CD04F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.", }, { lang: "es", value: "Se ha descubierto un problema en drivers/usb/gadget/composite.c en el kernel de Linux anterior a la versión 5.16.10. El subsistema USB Gadget carece de cierta validación de las solicitudes de descriptor del SO de la interfaz (las que tienen un índice de matriz grande y las asociadas a la recuperación de punteros de función NULL). Podría producirse una corrupción de memoria", }, ], id: "CVE-2022-25258", lastModified: "2024-11-21T06:51:53.473", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 4.9, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "PHYSICAL", availabilityImpact: "HIGH", baseScore: 4.6, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 0.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-02-16T20:15:07.517", references: [ { source: "cve@mitre.org", tags: [ "Release Notes", "Vendor Advisory", ], url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://github.com/szymonh/d-os-descriptor", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/torvalds/linux/commit/75e5b4849b81e19e9efe1654b30d7f3151c33c2c", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html", }, { source: "cve@mitre.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TCW2KZYJ2H6BKZE3CVLHRIXYDGNYYC5P/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20221028-0007/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2022/dsa-5092", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2022/dsa-5096", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", "Vendor Advisory", ], url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://github.com/szymonh/d-os-descriptor", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/torvalds/linux/commit/75e5b4849b81e19e9efe1654b30d7f3151c33c2c", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TCW2KZYJ2H6BKZE3CVLHRIXYDGNYYC5P/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20221028-0007/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2022/dsa-5092", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2022/dsa-5096", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-476", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
gsd-2022-25258
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.
Aliases
Aliases
{ GSD: { alias: "CVE-2022-25258", description: "An issue was discovered in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.", id: "GSD-2022-25258", references: [ "https://www.suse.com/security/cve/CVE-2022-25258.html", "https://www.debian.org/security/2022/dsa-5092", "https://www.debian.org/security/2022/dsa-5096", "https://advisories.mageia.org/CVE-2022-25258.html", "https://ubuntu.com/security/CVE-2022-25258", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2022-25258", ], details: "An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.", id: "GSD-2022-25258", modified: "2023-12-13T01:19:26.388244Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2022-25258", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/torvalds/linux/commit/75e5b4849b81e19e9efe1654b30d7f3151c33c2c", refsource: "MISC", url: "https://github.com/torvalds/linux/commit/75e5b4849b81e19e9efe1654b30d7f3151c33c2c", }, { name: "https://github.com/szymonh/d-os-descriptor", refsource: "MISC", url: "https://github.com/szymonh/d-os-descriptor", }, { name: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10", refsource: "MISC", url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10", }, { name: "FEDORA-2022-9d4e48836d", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCW2KZYJ2H6BKZE3CVLHRIXYDGNYYC5P/", }, { name: "DSA-5092", refsource: "DEBIAN", url: "https://www.debian.org/security/2022/dsa-5092", }, { name: "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html", }, { name: "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html", }, { name: "DSA-5096", refsource: "DEBIAN", url: "https://www.debian.org/security/2022/dsa-5096", }, { name: "https://security.netapp.com/advisory/ntap-20221028-0007/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20221028-0007/", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.16.10", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2022-25258", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-476", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/torvalds/linux/commit/75e5b4849b81e19e9efe1654b30d7f3151c33c2c", refsource: "MISC", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/torvalds/linux/commit/75e5b4849b81e19e9efe1654b30d7f3151c33c2c", }, { name: "https://github.com/szymonh/d-os-descriptor", refsource: "MISC", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://github.com/szymonh/d-os-descriptor", }, { name: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10", refsource: "MISC", tags: [ "Release Notes", "Vendor Advisory", ], url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10", }, { name: "FEDORA-2022-9d4e48836d", refsource: "FEDORA", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCW2KZYJ2H6BKZE3CVLHRIXYDGNYYC5P/", }, { name: "DSA-5096", refsource: "DEBIAN", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2022/dsa-5096", }, { name: "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html", }, { name: "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html", }, { name: "DSA-5092", refsource: "DEBIAN", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2022/dsa-5092", }, { name: "https://security.netapp.com/advisory/ntap-20221028-0007/", refsource: "CONFIRM", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20221028-0007/", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 4.9, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "PHYSICAL", availabilityImpact: "HIGH", baseScore: 4.6, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 0.9, impactScore: 3.6, }, }, lastModifiedDate: "2022-12-07T02:12Z", publishedDate: "2022-02-16T20:15Z", }, }, }
ghsa-5c8p-jxw7-78rv
Vulnerability from github
Published
2022-02-17 00:00
Modified
2022-03-17 00:05
Severity ?
Details
An issue was discovered in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.
{ affected: [], aliases: [ "CVE-2022-25258", ], database_specific: { cwe_ids: [ "CWE-476", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2022-02-16T20:15:00Z", severity: "MODERATE", }, details: "An issue was discovered in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.", id: "GHSA-5c8p-jxw7-78rv", modified: "2022-03-17T00:05:31Z", published: "2022-02-17T00:00:27Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-25258", }, { type: "WEB", url: "https://github.com/torvalds/linux/commit/75e5b4849b81e19e9efe1654b30d7f3151c33c2c", }, { type: "WEB", url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10", }, { type: "WEB", url: "https://github.com/szymonh/d-os-descriptor", }, { type: "WEB", url: "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html", }, { type: "WEB", url: "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCW2KZYJ2H6BKZE3CVLHRIXYDGNYYC5P", }, { type: "WEB", url: "https://security.netapp.com/advisory/ntap-20221028-0007", }, { type: "WEB", url: "https://www.debian.org/security/2022/dsa-5092", }, { type: "WEB", url: "https://www.debian.org/security/2022/dsa-5096", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", type: "CVSS_V3", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.